Sciweavers

1920 search results - page 366 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
PLDI
2009
ACM
14 years 2 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
IEEEPACT
2008
IEEE
14 years 1 months ago
Multitasking workload scheduling on flexible-core chip multiprocessors
While technology trends have ushered in the age of chip multiprocessors (CMP) and enabled designers to place an increasing number of cores on chip, a fundamental question is what ...
Divya Gulati, Changkyu Kim, Simha Sethumadhavan, S...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 1 months ago
Design Linear Multiuser Transmitters from Linear Multiuser Receivers
— Novel concepts are introduced for finding the relationship between multiuser detection (MUD) and multiuser transmission (MUT), so that the study in MUT can benefit from the w...
Lie-Liang Yang
INFOCOM
2007
IEEE
14 years 1 months ago
A Framework for Multi-Objective SLA Compliance Monitoring
Abstract— Service level agreements (SLAs) specify performance guarantees made by service providers, typically in terms of packet loss, delay, delay variation, and network availab...
Joel Sommers, Paul Barford, Nick G. Duffield, Amos...
ICRA
2006
IEEE
210views Robotics» more  ICRA 2006»
14 years 1 months ago
Programmable Central Pattern Generators: an Application to Biped Locomotion Control
— We present a system of coupled nonlinear oscillators to be used as programmable central pattern generators, and apply it to control the locomotion of a humanoid robot. Central ...
Ludovic Righetti, Auke Jan Ijspeert