• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,124
Next 10 →

Race Detection in Two Dimensions

by Dimitar Dimitrov, Martin Vechev, Vivek Sarkar
"... Dynamic data race detection is a program analysis technique for detecting errors provoked by undesired interleavings of concurrent threads. A primary challenge when designing efficient race detection algorithms is to achieve manageable space requirements. State of the art algorithms for unstructured ..."
Abstract - Add to MetaCart
Dynamic data race detection is a program analysis technique for detecting errors provoked by undesired interleavings of concurrent threads. A primary challenge when designing efficient race detection algorithms is to achieve manageable space requirements. State of the art algorithms

Rendering of Surfaces from Volume Data

by Marc Levoy - IEEE COMPUTER GRAPHICS AND APPLICATIONS , 1988
"... The application of volume rendering techniques to the display of surfaces from sampled scalar functions of three spatial dimensions is explored. Fitting of geometric primitives to the sampled data is not required. Images are formed by directly shading each sample and projecting it onto the picture ..."
Abstract - Cited by 875 (12 self) - Add to MetaCart
The application of volume rendering techniques to the display of surfaces from sampled scalar functions of three spatial dimensions is explored. Fitting of geometric primitives to the sampled data is not required. Images are formed by directly shading each sample and projecting it onto

Using Canny’s criteria to derive a recursively implemented optimal edge detector

by Rachid Deriche - J. OF COMP. VISION , 1987
"... A highly efficient recursive algorithm for edge detection is presented. Using Canny's design [1], we show that a solution to his precise formulation of detection and localization for an infinite extent filter leads to an optimal operator in one dimension, which can be efficiently implemented by ..."
Abstract - Cited by 289 (14 self) - Add to MetaCart
A highly efficient recursive algorithm for edge detection is presented. Using Canny's design [1], we show that a solution to his precise formulation of detection and localization for an infinite extent filter leads to an optimal operator in one dimension, which can be efficiently implemented

Hybrid Dynamic Data Race Detection

by Robert O'Callahan, et al. , 2003
"... We present a new method for dynamically detecting potential data races in multithreaded programs. Our method improves on the state of the art in accuracy, in usability, and in overhead. We improve accuracy by combining two previously known race detection techniques — lockset-based detection and happ ..."
Abstract - Cited by 165 (0 self) - Add to MetaCart
We present a new method for dynamically detecting potential data races in multithreaded programs. Our method improves on the state of the art in accuracy, in usability, and in overhead. We improve accuracy by combining two previously known race detection techniques — lockset-based detection

A type and effect system for atomicity

by Cormac Flanagan, Shaz Qadeer - In PLDI 03: Programming Language Design and Implementation , 2003
"... Ensuring the correctness of multithreaded programs is difficult, due to the potential for unexpected and nondeterministic interactions between threads. Previous work addressed this problem by devising tools for detecting race conditions, a situation where two threads simultaneously access the same d ..."
Abstract - Cited by 252 (22 self) - Add to MetaCart
Ensuring the correctness of multithreaded programs is difficult, due to the potential for unexpected and nondeterministic interactions between threads. Previous work addressed this problem by devising tools for detecting race conditions, a situation where two threads simultaneously access the same

Conscious and unconscious perception: Experiments in visual masking and word recognition

by Anthony J. Marcel - Cognitive Psychology , 1983
"... Five experiments are presented which explore the relation of masking to con-sciousness and visual word processing. In Experiment 1 a single word or blank field was followed by a pattern mask. Subjects had to make one of three decisions: Did anything precede the mask? To which of two probe words was ..."
Abstract - Cited by 250 (0 self) - Add to MetaCart
was what preceded the mask more similar graphically? To which of two probe words was it more similar semantically? As word-mask stimulus onset asynchrony (SOA) was re-duced, subjects reached chance performance on the detection, graphic, and semantic decisions in that order. In Experiment 2, subjects again

Atomizer: a dynamic atomicity checker for multithreaded programs

by Cormac Flanagan, Stephen N. Freund - In POPL , 2004
"... Ensuring the correctness of multithreaded programs is difficult, due to the potential for unexpected interactions between concurrent threads. We focus on the fundamental non-interference property of atomicity and present a dynamic analysis for detecting atomicity violations. This analysis combines i ..."
Abstract - Cited by 241 (14 self) - Add to MetaCart
ideas from both Lipton’s theory of reduction and earlier dynamic race detectors such as Eraser. Experimental results demonstrate that this dynamic atomicity analysis is effective for detecting errors due to unintended interactions between threads. In addition, the majority of methods in our benchmarks

Conditional must not aliasing for static race detection

by Mayur Naik, Alex Aiken - In POPL , 2007
"... Abstract Race detection algorithms for multi-threaded programs using thecommon lock-based synchronization idiom must correlate locks with the memory locations they guard. The heart of a proof ofrace freedom is showing that if two locks are distinct, then the memory locations they guard are also dist ..."
Abstract - Cited by 102 (4 self) - Add to MetaCart
Abstract Race detection algorithms for multi-threaded programs using thecommon lock-based synchronization idiom must correlate locks with the memory locations they guard. The heart of a proof ofrace freedom is showing that if two locks are distinct, then the memory locations they guard are also

Types for safe locking: Static race detection for Java

by Martin Abadi, Cormac Flanagan, Stephen N. Freund - ACM Transactions on Programming Languages and Systems , 2006
"... This article presents a static race-detection analysis for multithreaded shared-memory programs, focusing on the Java programming language. The analysis is based on a type system that captures many common synchronization patterns. It supports classes with internal synchronization, classes that requi ..."
Abstract - Cited by 91 (9 self) - Add to MetaCart
This article presents a static race-detection analysis for multithreaded shared-memory programs, focusing on the Java programming language. The analysis is based on a type system that captures many common synchronization patterns. It supports classes with internal synchronization, classes

Dissociable executive functions in the dynamic control of behavior: inhibition, error detection, and correction

by H. Garavan, T. J. Ross, K. Murphy, R. A. P. Roche, E. A. Stein - Neuroimage , 2002
"... The present study employed event-related fMRI and EEG to investigate the biological basis of the cognitive control of behavior. Using a GO/NOGO task optimized to produce response inhibitions, frequent commission errors, and the opportunity for subsequent behavioral correction, we identified distinct ..."
Abstract - Cited by 159 (4 self) - Add to MetaCart
distinct cortical areas associated with each of these specific executive processes. Two cortical systems, one involving right prefrontal and parietal areas and the second regions of the cingulate, underlay inhibitory control. The involvement of these two systems was predicated upon the difficulty
Next 10 →
Results 1 - 10 of 2,124
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University