Sciweavers

1585 search results - page 54 / 317
» Automatically optimizing secure computation
Sort
View
OSDI
2006
ACM
14 years 8 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
PRDC
1999
IEEE
14 years 4 days ago
Availability and Performance Evaluation for Automatic Protection Switching in TDMA Wireless System
In this paper, we compare the availability and performance of a wireless TDMA system with and without automatic protection switching. Stochastic reward net models are constructed ...
Hairong Sun, Yonghuan Cao, Kishor S. Trivedi, Jame...
IEEEPACT
2006
IEEE
14 years 1 months ago
Fast, automatic, procedure-level performance tuning
This paper presents an automated performance tuning solution, which partitions a program into a number of tuning sections and finds the best combination of compiler options for e...
Zhelong Pan, Rudolf Eigenmann
ICCS
2003
Springer
14 years 1 months ago
Self-Adapting Numerical Software and Automatic Tuning of Heuristics
Self-Adapting Numerical Software (SANS) systems aim to bridge the knowledge gap that exists between the expertise of domain scientists, and the know-how that is needed to fulfill...
Jack Dongarra, Victor Eijkhout
CVPR
2006
IEEE
14 years 10 months ago
Automatic Cast Listing in Feature-Length Films with Anisotropic Manifold Space
Our goal is to automatically determine the cast of a feature-length film. This is challenging because the cast size is not known, with appearance changes of faces caused by extrin...
Ognjen Arandjelovic, Roberto Cipolla