Results 1 - 10
of
182
Optimistic parallelism requires abstractions
- In PLDI
, 2007
"... Irregular applications, which manipulate large, pointer-based data structures like graphs, are difficult to parallelize manually. Automatic tools and techniques such as restructuring compilers and runtime speculative execution have failed to uncover much parallelism in these applications, in spite o ..."
Abstract
-
Cited by 179 (24 self)
- Add to MetaCart
be uncovered by compiler analysis. In principle, optimistic techniques such as thread-level speculation can be used to uncover this parallelism, but we argue that current implementations cannot accomplish this because they do not use the proper abstractions for the data structures in these programs
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
- INTERNATION SYMPOSIUM ON COMPUTER ARCHITECTURE
, 2008
"... Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications
can severely degrade without hardware support for tracking taints.
This paper observes that information flow tracking can
be efficie ..."
Abstract
-
Cited by 13 (3 self)
- Add to MetaCart
be efficiently emulated using deferred exception tracking in
microprocessors supporting speculative execution. Based
on this observation, we propose SHIFT, a low-overhead,
software-based dynamic information flow tracking system
to detect a wide range of attacks. The key idea is to
treat tainted state
Principles of Secure Information Flow Analysis
- Malware Detection
, 2007
"... is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this paper, we explore a technique called secure information flow analysis. Suppose that some sensitive information is stored on a computer system. How can ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this paper, we explore a technique called secure information flow analysis. Suppose that some sensitive information is stored on a computer system. How
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
"... Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various se-curity attacks. However, the runtime performance can be severely degraded without efficient hardware support. This paper observes that information flow tracking can be efficiently emulated ..."
Abstract
- Add to MetaCart
using deferred exception tracking in microprocessors supporting speculative execution. Based on the observation, we propose SHIFT, a low-overhead, software-based dynamic information flow tracking system to detect a wide range of attacks. The key idea is to treat tainted state (describing untrusted data
An information flow method to detect denial of service vulnerabilities
- Formal Specifications of Computer-Based Systems, volume 9, pages 1258– 1260. Journal of Universal Computer Science
, 2003
"... Abstract: Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showing how to formalize some existing principles used to make cryptographic protocols more resistant to denial of service by comparing the cost to the defender against the cost to the attacker. ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
, cryptographic primitives and special semantic features in order to handle cryptographic protocols. Impassivity is defined as an information flow property founded on bisimulation-based non-deterministic admissible interference. A sound and complete proof method for impassivity is provided. The method extends
Automatic Detection and Tracking of Human Motion with a View-Based Representation
- European Conf. On Computer Vision, ECCV’02
, 2002
"... This paper proposes a solution for the automatic detection and tracking of human motion in image sequences. Due to the complexity of the human body and its motion, automatic detection of 3D human motion remains an open, and important, problem. Existing approaches for automatic detection and tracking ..."
Abstract
-
Cited by 55 (1 self)
- Add to MetaCart
and tracking focus on 2D cues and typically exploit object appearance (color distribution, shape) or knowledge of a static background. In contrast, we exploit 2D optical flow information which provides rich descriptive cues, while being independent of object and background appearance. To represent the optical
The Potential of Synergistic Static, Dynamic and Speculative Loop Nest Optimizations for Automatic Parallelization
, 2010
"... Research in automatic parallelization of loop-centric programs started with static analysis, then broadened its arsenal to include dynamic inspection-execution and speculative execution, the best results involving hybrid static-dynamic schemes. Beyond the detection of parallelism in a sequential pro ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Research in automatic parallelization of loop-centric programs started with static analysis, then broadened its arsenal to include dynamic inspection-execution and speculative execution, the best results involving hybrid static-dynamic schemes. Beyond the detection of parallelism in a sequential
Hardware for Speculative Run-Time Parallelization in Distributed Shared-Memory Multiprocessors1
"... Abstract Run-time parallelization is often the only way to execute the code in parallel when data dependence information is incomplete at compile time. This situation is common in many important applications. Unfortunately, known techniques for run-time parallelization are often computationally expe ..."
Abstract
- Add to MetaCart
expensive or not general enough. To address this problem, we propose new hardware support for efficient run-time parallelization in distributed shared-memory (DSM) multiprocessors. The idea is to execute the code in parallel speculatively and use extensions to the cache coherence protocol hardware to detect
Linguistic scope-based and biological event-based speculation and negation annotations in the Genia Event and Bio- Scope corpora
"... Background: The treatment of negation and hedging in natural language processing has received much interest recently, especially in the biomedical domain. However, open access corpora annotated for negation and/or speculation are hardly available for training and testing applications, and even if th ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
the key events, thus if we aim to detect ”new knowledge”, an automatic scope-detector trained on BioScope can contribute to biomedical information extraction. However, for detecting the negation and speculation status of events (within events)
Detection of Eye Locations in Unconstrained Visual Images
- In: IEEE International Conference on Image Processing
, 1996
"... This paper describes a computational approach for accurately determining the location of human eyes in unconstrained monoscopic gray level images. The proposed method is based on exploiting the flow field characteristics that arise due to the presence of a dark iris surrounded by a light sclera. A n ..."
Abstract
-
Cited by 31 (0 self)
- Add to MetaCart
novel aspect of the proposed method lies in its use of both spatial and temporal information to detect the location of the eyes. The spatial processing utilizes flow field information to select a pool of potential candidate locations for the eyes. Temporal processing uses the principle of continuity
Results 1 - 10
of
182