Sciweavers

661 search results - page 70 / 133
» What Can We Expect from Program Verification
Sort
View
MICRO
2002
IEEE
164views Hardware» more  MICRO 2002»
14 years 1 months ago
A quantitative framework for automated pre-execution thread selection
Pre-execution attacks cache misses for which conventional address-prediction driven prefetching is ineffective. In pre-execution, copies of cache miss computations are isolated fr...
Amir Roth, Gurindar S. Sohi
CHI
2005
ACM
14 years 9 months ago
Programmatic semantics for natural language interfaces
An important way of making interfaces usable by nonexpert users is to enable the use of natural language input, as in natural language query interfaces to databases, or MUDs and M...
Hugo Liu, Henry Lieberman
ICFP
2003
ACM
14 years 8 months ago
Dynamic rebinding for marshalling and update, with destruct-time?
Most programming languages adopt static binding, but for distributed programming an exclusive reliance on static binding is too restrictive: dynamic binding is required in various...
Gavin M. Bierman, Michael W. Hicks, Peter Sewell, ...
CSEE
2011
Springer
13 years 8 days ago
Pex4Fun: Teaching and learning computer science via social gaming
Pex4Fun (http://www.pexforfun.com/)from Microsoft Research is a web-based serious gaming environment for teaching computer science. Pex4Fun can be used to teach and learn computer...
Nikolai Tillmann, Jonathan de Halleux, Tao Xie
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 2 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...