Sciweavers

1615 search results - page 138 / 323
» Evaluation of current architecture frameworks
Sort
View
ICISC
2004
122views Cryptology» more  ICISC 2004»
15 years 6 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
POPL
2002
ACM
16 years 4 months ago
Towards automatic construction of staged compilers
Some compilation systems, such as offline partial evaluators and selective dynamic compilation systems, support staged optimizations. A staged optimization is one where a logicall...
Matthai Philipose, Craig Chambers, Susan J. Eggers
271
Voted
VLSI
2012
Springer
14 years 2 days ago
A Signature-Based Power Model for MPSoC on FPGA
e technique is based on abstract execution profiles, called event signatures, and it operates at a higher level of abstraction than, for example, commonly used instruction-set sim...
Roberta Piscitelli, Andy D. Pimentel
UM
2010
Springer
15 years 9 months ago
PersonisJ: Mobile, Client-Side User Modelling
The increasing trend towards powerful mobile phones opens many possibilities for valuable personalised services to be available on the phone. Client-side personalisation for these ...
Simon Gerber, Michael Fry, Judy Kay, Bob Kummerfel...
145
Voted
ASPLOS
2008
ACM
15 years 6 months ago
Merge: a programming model for heterogeneous multi-core systems
In this paper we propose the Merge framework, a general purpose programming model for heterogeneous multi-core systems. The Merge framework replaces current ad hoc approaches to p...
Michael D. Linderman, Jamison D. Collins, Hong Wan...