Search
Now showing items 141-150 of 203
A Theoretical Study of the Synergy and Lazy Annotation Algorithms
(2018-04-03)
Given a program with assertions, the assertion checking problem is to tell whether there is an execution of the program that violates one of the assertions. One approach to this problem is to explore different paths towards ...
Improving the Precision of a Scalable Demand-Driven Null- Dereference Verification for Java
(2018-03-19)
The problem addressed in this thesis is sound, scalable, demand-driven null-dereference verification for Java programs via over-approximated weakest preconditions analysis. The base version of this analysis having been ...
Transducer-based Algorithmic Verification of Retransmission Protocols over Noisy Channels
(2018-04-05)
Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this work, we consider noisy channels which can corrupt messages. We present an approach to model ...
Integrated Parallel Simulations and Visualization for Large-Scale Weather Applications
(2018-07-28)
The emergence of the exascale era necessitates development of new techniques to efficiently perform high-performance scientific simulations, online data analysis and on-the-fly visualization. Critical applications like ...
Efficient Compilation Of Stream Programs Onto Multi-cores With Accelerators
(2010-12-30)
Over the past two decades, microprocessor manufacturers have typically relied on wider issue widths and deeper pipelines to obtain performance improvements for single threaded applications. However, in the recent years, ...
Conflict-Tolerant Features
(2010-12-07)
Large, software intensive systems are typically developed using a feature oriented development paradigm in which feature specifications are derived from domain requirements and features are implemented to satisfy such ...
Analysis Of A Sieving Heuristic For The Number Field Sieve And Design Of Low-Correlation CDMA Sequences
(2011-01-25)
In this thesis, we investigate in detail, certain important problems in cryptography and coding theory.
In the first part of this thesis, we discuss the number field sieve and compare the two ways in which the sieving ...
Online Optimization Of RED Routers
(2011-04-25)
Plan Bouquets : An Exploratory Approach to Robust Query Processing
(2017-09-26)
Over the last four decades, relational database systems, with their mathematical basis in first-order logic, have provided a congenial and efficient environment to handle enterprise data during its entire life cycle of ...