Sciweavers

135 search results - page 15 / 27
» Data Dependence Analysis of Assembly Code
Sort
View
CC
2006
Springer
124views System Software» more  CC 2006»
14 years 16 days ago
Polyhedral Code Generation in the Real World
The polyhedral model is known to be a powerful framework to reason about high level loop transformations. Recent developments in optimizing compilers broke some generally accepted ...
Nicolas Vasilache, Cédric Bastoul, Albert C...
BMCBI
2008
99views more  BMCBI 2008»
13 years 9 months ago
Exhaustive prediction of disease susceptibility to coding base changes in the human genome
Background: Single Nucleotide Polymorphisms (SNPs) are the most abundant form of genomic variation and can cause phenotypic differences between individuals, including diseases. Ba...
Vinayak Kulkarni, Mounir Errami, Robert Barber, Ha...
RAID
2005
Springer
14 years 2 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
ICS
1997
Tsinghua U.
14 years 28 days ago
Iteration Space Slicing and Its Application to Communication Optimization
Program slicing is an analysis that answers questions such as \Which statements might a ect the computation of variable v at statement s?" or \Which statements depend on the ...
William Pugh, Evan Rosser
PPOPP
1999
ACM
14 years 1 months ago
Automatic Parallelization of Divide and Conquer Algorithms
Divide and conquer algorithms are a good match for modern parallel machines: they tend to have large amounts of inherent parallelism and they work well with caches and deep memory...
Radu Rugina, Martin C. Rinard