Sciweavers

309 search results - page 33 / 62
» Code Transformations for One-Pass Analysis
Sort
View
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
15 years 8 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...
122
Voted
SCAM
2006
IEEE
15 years 8 months ago
SMART C: A Semantic Macro Replacement Translator for C
Programmers often want to transform the source or binary representations of their programs (e.g., to optimize, add dynamic safety checks, or add profile gathering code). Unfortun...
Matthew Jacobs, E. Christopher Lewis
IEEEPACT
1998
IEEE
15 years 6 months ago
Parallelization of Benchmarks for Scalable Shared-Memory Multiprocessors
This work identifies practical compiling techniques for scalable shared memory machines. For this, we have focused on experimental studies using a real machine and representative ...
Yunheung Paek, Angeles G. Navarro, Emilio L. Zapat...
SSIAI
2002
IEEE
15 years 7 months ago
Feature Extraction from Hyperspectral Images Compressed Using the JPEG-2000 Standard
We present results quantifying the exploitability of compressed remote sensing imagery. The performance of various feature extraction and classification tasks is measured on hype...
Mihaela D. Pal, Christopher M. Brislawn, Steven P....
107
Voted
WCRE
1997
IEEE
15 years 6 months ago
Generation of Components for Software Renovation Factories from Context-Free Grammars
We present an approach for the generation of components for a software renovation factory. These components are generated from a context-free grammar definition that recognizes t...
Mark van den Brand, M. P. A. Sellink, Chris Verhoe...