• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 182
Next 10 →

Optimistic parallelism requires abstractions

by Milind Kulkarni, Keshav Pingali - In PLDI , 2007
"... Irregular applications, which manipulate large, pointer-based data structures like graphs, are difficult to parallelize manually. Automatic tools and techniques such as restructuring compilers and runtime speculative execution have failed to uncover much parallelism in these applications, in spite o ..."
Abstract - Cited by 179 (24 self) - Add to MetaCart
be uncovered by compiler analysis. In principle, optimistic techniques such as thread-level speculation can be used to uncover this parallelism, but we argue that current implementations cannot accomplish this because they do not use the proper abstractions for the data structures in these programs

From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware

by Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-chung Yew, Frederic T. Chong - INTERNATION SYMPOSIUM ON COMPUTER ARCHITECTURE , 2008
"... Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely degrade without hardware support for tracking taints. This paper observes that information flow tracking can be efficie ..."
Abstract - Cited by 13 (3 self) - Add to MetaCart
be efficiently emulated using deferred exception tracking in microprocessors supporting speculative execution. Based on this observation, we propose SHIFT, a low-overhead, software-based dynamic information flow tracking system to detect a wide range of attacks. The key idea is to treat tainted state

Principles of Secure Information Flow Analysis

by Geoffrey Smith - Malware Detection , 2007
"... is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this paper, we explore a technique called secure information flow analysis. Suppose that some sensitive information is stored on a computer system. How can ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this paper, we explore a technique called secure information flow analysis. Suppose that some sensitive information is stored on a computer system. How

From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware

by unknown authors
"... Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various se-curity attacks. However, the runtime performance can be severely degraded without efficient hardware support. This paper observes that information flow tracking can be efficiently emulated ..."
Abstract - Add to MetaCart
using deferred exception tracking in microprocessors supporting speculative execution. Based on the observation, we propose SHIFT, a low-overhead, software-based dynamic information flow tracking system to detect a wide range of attacks. The key idea is to treat tainted state (describing untrusted data

An information flow method to detect denial of service vulnerabilities

by Stéphane Lafrance, John Mullins - Formal Specifications of Computer-Based Systems, volume 9, pages 1258– 1260. Journal of Universal Computer Science , 2003
"... Abstract: Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showing how to formalize some existing principles used to make cryptographic protocols more resistant to denial of service by comparing the cost to the defender against the cost to the attacker. ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
, cryptographic primitives and special semantic features in order to handle cryptographic protocols. Impassivity is defined as an information flow property founded on bisimulation-based non-deterministic admissible interference. A sound and complete proof method for impassivity is provided. The method extends

Automatic Detection and Tracking of Human Motion with a View-Based Representation

by Ronan Fablet, Michael J. Black - European Conf. On Computer Vision, ECCV’02 , 2002
"... This paper proposes a solution for the automatic detection and tracking of human motion in image sequences. Due to the complexity of the human body and its motion, automatic detection of 3D human motion remains an open, and important, problem. Existing approaches for automatic detection and tracking ..."
Abstract - Cited by 55 (1 self) - Add to MetaCart
and tracking focus on 2D cues and typically exploit object appearance (color distribution, shape) or knowledge of a static background. In contrast, we exploit 2D optical flow information which provides rich descriptive cues, while being independent of object and background appearance. To represent the optical

The Potential of Synergistic Static, Dynamic and Speculative Loop Nest Optimizations for Automatic Parallelization

by Riyadh Baghdadi, Albert Cohen, Cedric Bastoul, Louis-noël Pouchet, Lawrence Rauchwerger , 2010
"... Research in automatic parallelization of loop-centric programs started with static analysis, then broadened its arsenal to include dynamic inspection-execution and speculative execution, the best results involving hybrid static-dynamic schemes. Beyond the detection of parallelism in a sequential pro ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Research in automatic parallelization of loop-centric programs started with static analysis, then broadened its arsenal to include dynamic inspection-execution and speculative execution, the best results involving hybrid static-dynamic schemes. Beyond the detection of parallelism in a sequential

Hardware for Speculative Run-Time Parallelization in Distributed Shared-Memory Multiprocessors1

by Ye Zhangy
"... Abstract Run-time parallelization is often the only way to execute the code in parallel when data dependence information is incomplete at compile time. This situation is common in many important applications. Unfortunately, known techniques for run-time parallelization are often computationally expe ..."
Abstract - Add to MetaCart
expensive or not general enough. To address this problem, we propose new hardware support for efficient run-time parallelization in distributed shared-memory (DSM) multiprocessors. The idea is to execute the code in parallel speculatively and use extensions to the cache coherence protocol hardware to detect

Linguistic scope-based and biological event-based speculation and negation annotations in the Genia Event and Bio- Scope corpora

by Veronika Vincze, György Szarvas, György Móra, Tomoko Ohta, Richárd Farkas
"... Background: The treatment of negation and hedging in natural language processing has received much interest recently, especially in the biomedical domain. However, open access corpora annotated for negation and/or speculation are hardly available for training and testing applications, and even if th ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
the key events, thus if we aim to detect ”new knowledge”, an automatic scope-detector trained on BioScope can contribute to biomedical information extraction. However, for detecting the negation and speculation status of events (within events)

Detection of Eye Locations in Unconstrained Visual Images

by Ravi Kothari, Jason L. Mitchell - In: IEEE International Conference on Image Processing , 1996
"... This paper describes a computational approach for accurately determining the location of human eyes in unconstrained monoscopic gray level images. The proposed method is based on exploiting the flow field characteristics that arise due to the presence of a dark iris surrounded by a light sclera. A n ..."
Abstract - Cited by 31 (0 self) - Add to MetaCart
novel aspect of the proposed method lies in its use of both spatial and temporal information to detect the location of the eyes. The spatial processing utilizes flow field information to select a pool of potential candidate locations for the eyes. Temporal processing uses the principle of continuity
Next 10 →
Results 1 - 10 of 182
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University