Control flow analysis

Results: 217



#Item
81Analysis and Forecasting of Time Series by Averaged Scalar Products of Flow Vectors

Analysis and Forecasting of Time Series by Averaged Scalar Products of Flow Vectors

Add to Reading List

Source URL: www.complex-systems.com

Language: English - Date: 2013-03-26 14:35:01
82Video-Based People Tracking Marcus A. Brubaker, Leonid Sigal and David J. Fleet 1 Introduction Vision-based human pose tracking promises to be a key enabling technology for myriad applications, including the analysis of

Video-Based People Tracking Marcus A. Brubaker, Leonid Sigal and David J. Fleet 1 Introduction Vision-based human pose tracking promises to be a key enabling technology for myriad applications, including the analysis of

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2014-08-28 17:44:57
83CS109A Notes for LectureMeasuring the Running Time of Programs Fix a measure of the \size

CS109A Notes for LectureMeasuring the Running Time of Programs Fix a measure of the \size" n of the data to which a program is being applied. Example: For integer arguments, the value is

Add to Reading List

Source URL: infolab.stanford.edu

Language: English - Date: 2008-09-19 00:57:57
84CFA2: a Context-Free Approach to Control-Flow Analysis Dimitrios Vardoulakis and Olin Shivers Northeastern University {dimvar,shivers}@ccs.neu.edu

CFA2: a Context-Free Approach to Control-Flow Analysis Dimitrios Vardoulakis and Olin Shivers Northeastern University {dimvar,shivers}@ccs.neu.edu

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2010-02-16 14:40:14
85GRAPHITE Two Years After First Lessons Learned From Real-World Polyhedral Compilation Konrad Trifunovic2 , Albert Cohen2 , David Edelsohn3 , Li Feng6 , Tobias Grosser5 , Harsha Jagasia1 , Razya Ladelsky4 , Sebastian Pop1

GRAPHITE Two Years After First Lessons Learned From Real-World Polyhedral Compilation Konrad Trifunovic2 , Albert Cohen2 , David Edelsohn3 , Li Feng6 , Tobias Grosser5 , Harsha Jagasia1 , Razya Ladelsky4 , Sebastian Pop1

Add to Reading List

Source URL: www.grosser.es

Language: English - Date: 2010-07-25 08:26:30
86Analysis of Unidirectional IP Traffic to Darkspace with an Educational Data Kit Tanja Zseby Alistair King

Analysis of Unidirectional IP Traffic to Darkspace with an Educational Data Kit Tanja Zseby Alistair King

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-07 19:26:07
87March March2006 2006 Improving System Reliability Using the Saber ® Simulator in a Robust Design Flow

March March2006 2006 Improving System Reliability Using the Saber ® Simulator in a Robust Design Flow

Add to Reading List

Source URL: www.synopsys.com

Language: English - Date: 2015-01-29 17:15:40
88Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems

Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2008-01-14 11:26:40
89Sloppy Python: Using Dynamic Analysis to Automatically Add Error Tolerance to Ad-Hoc Data Processing Scripts Philip J. Guo Computer Systems Laboratory Stanford University

Sloppy Python: Using Dynamic Analysis to Automatically Add Error Tolerance to Ad-Hoc Data Processing Scripts Philip J. Guo Computer Systems Laboratory Stanford University

Add to Reading List

Source URL: pgbovine.net

Language: English - Date: 2014-01-03 23:24:44
90The Auspicious Couple: Symbolic Execution and WCET Analysis * Armin Biere1 , Jens Knoop2 , Laura Kovács3 , and Jakob Zwirchmayr2 1 2 3

The Auspicious Couple: Symbolic Execution and WCET Analysis * Armin Biere1 , Jens Knoop2 , Laura Kovács3 , and Jakob Zwirchmayr2 1 2 3

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2013-12-12 08:46:27