Sciweavers

981 search results - page 135 / 197
» Symbolic pointer analysis
Sort
View
ISSAC
2007
Springer
94views Mathematics» more  ISSAC 2007»
14 years 3 months ago
Faster algorithms for the characteristic polynomial
A new randomized algorithm is presented for computing the characteristic polynomial of an n × n matrix over a field. Over a sufficiently large field the asymptotic expected com...
Clément Pernet, Arne Storjohann
DATE
1999
IEEE
123views Hardware» more  DATE 1999»
14 years 1 months ago
Accounting for Various Register Allocation Schemes During Post-Synthesis Verification of RTL Designs
This paper reports a formal methodology for verifying a broad class of synthesized register-transfer-level (RTL) designs by accommodating various register allocation/optimization ...
Nazanin Mansouri, Ranga Vemuri
USS
2008
13 years 11 months ago
Hypervisor Support for Identifying Covertly Executing Binaries
Hypervisors have been proposed as a security tool to defend against malware that subverts the OS kernel. However, hypervisors must deal with the semantic gap between the low-level...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...
BIBM
2008
IEEE
106views Bioinformatics» more  BIBM 2008»
13 years 11 months ago
Invariance Kernel of Biological Regulatory Networks
: The analysis of Biological Regulatory Network (BRN) leads to compute the set of the possible behaviours of the biological components. These behaviours are seen as trajectories an...
Jamil Ahmad, Olivier Roux
CIARP
2008
Springer
13 years 11 months ago
Pattern Recognition Methods for Querying and Browsing Technical Documentation
Abstract. Graphics recognition deals with the specific pattern recognition problems found in graphics-rich documents, typical technical documentation of all kinds. In this paper, w...
Karl Tombre, Bart Lamiroy