Sciweavers

2056 search results - page 319 / 412
» time 2000
Sort
View
DATE
2004
IEEE
97views Hardware» more  DATE 2004»
14 years 2 months ago
A Formal Verification Methodology for Checking Data Integrity
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verificati...
Yasushi Umezawa, Takeshi Shimizu
CGO
2006
IEEE
14 years 2 months ago
2D-Profiling: Detecting Input-Dependent Branches with a Single Input Data Set
Static compilers use profiling to predict run-time program behavior. Generally, this requires multiple input sets to capture wide variations in run-time behavior. This is expensiv...
Hyesoon Kim, M. Aater Suleman, Onur Mutlu, Yale N....
CICLING
2006
Springer
14 years 2 months ago
A General and Multi-lingual Phrase Chunking Model Based on Masking Method
Several phrase chunkers have been proposed over the past few years. Some state-of-the-art chunkers achieved better performance via integrating external resources, e.g., parsers and...
Yu-Chieh Wu, Chia-Hui Chang, Yue-Shi Lee
EUROPAR
2006
Springer
14 years 2 months ago
An Embedded Systems Programming Environment for C
Resource constraints are a major concern with the design, development, and deployment of embedded systems. Embedded systems are highly hardware-dependent and have little computatio...
Bernd Burgstaller, Bernhard Scholz, M. Anton Ertl
ACSAC
2001
IEEE
14 years 2 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras