Sciweavers

1940 search results - page 38 / 388
» Dependable Software: An Oxymoron
Sort
View
IPPS
2010
IEEE
13 years 6 months ago
Clustering JVMs with software transactional memory support
Affordable transparent clustering solutions to scale non-HPC applications on commodity clusters (such as Terracotta) are emerging for Java Virtual Machines (JVMs). Working in this ...
Christos Kotselidis, Mikel Luján, Mohammad ...
TSP
2010
13 years 3 months ago
ALOHA with collision resolution (ALOHA-CR): theory and software defined radio implementation
A cross-layer scheme, namely ALOHA With Collision Resolution (ALOHA-CR), is proposed for high throughput wireless communications in a cellular scenario. Transmission occurs in a t...
Xin Liu, John Kountouriotis, Athina P. Petropulu, ...
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 6 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
ICSM
2005
IEEE
14 years 2 months ago
Reducing Build Time through Precompilations for Evolving Large Software
Large-scale legacy programs take long time to compile, thereby hampering productivity. This paper presents algorithms that reduce compilation time by analyzing syntactic dependenc...
Yijun Yu, Homayoun Dayani-Fard, John Mylopoulos, P...
IEEEPACT
2002
IEEE
14 years 1 months ago
Software Bubbles: Using Predication to Compensate for Aliasing in Software Pipelines
This paper describes a technique for utilizing predication to support software pipelining on EPIC architectures in the presence of dynamic memory aliasing. The essential idea is t...
Benjamin Goldberg, Emily Crutcher, Chad Huneycutt,...