Sciweavers

223 search results - page 20 / 45
» A Compiler Scheme for Reusing Intermediate Computation Resul...
Sort
View
ASIACRYPT
2010
Springer
13 years 6 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
SAS
2000
Springer
149views Formal Methods» more  SAS 2000»
13 years 11 months ago
FULLDOC: A Full Reporting Debugger for Optimized Code
As compilers increasingly rely on optimizations to achieve high performance, the effectiveness of source level debuggers for optimized code continues to falter. Even if values of s...
Clara Jaramillo, Rajiv Gupta, Mary Lou Soffa
PPDP
1999
Springer
14 years 4 days ago
A Virtual Machine for a Process Calculus
Abstract. Despite extensive theoretical work on process-calculi, virtual machine specifications and implementations of actual computational models are still scarce. This paper pre...
Luís M. B. Lopes, Fernando M. A. Silva, Vas...
ICDE
2008
IEEE
120views Database» more  ICDE 2008»
14 years 9 months ago
Sideways Information Passing for Push-Style Query Processing
In many modern data management settings, data is queried from a central node or nodes, but is stored at remote sources. In such a setting it is common to perform "pushstyle&qu...
Zachary G. Ives, Nicholas E. Taylor
SAC
2005
ACM
14 years 1 months ago
Avoiding data conversions in embedded media processors
Complex application-specific media instructions and kernels are emulated with simple to implement extended subword instructions. We show that assuming extended register file ent...
Ben H. H. Juurlink, Asadollah Shahbahrami, Stamati...