Sciweavers

1294 search results - page 83 / 259
» FFT Compiler Techniques
Sort
View
122
Voted
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Improving the Security of Quantum Protocols via Commit-and-Open
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Ivan Damgård, Serge Fehr, Carolin Lunemann, ...
128
Voted
IEEEINTERACT
2003
IEEE
15 years 8 months ago
Procedure Cloning and Integration for Converting Parallelism from Coarse to Fine Grain
This paper introduces a method for improving program run-time performance by gathering work in an application and executing it efficiently in an integrated thread. Our methods ext...
Won So, Alexander G. Dean
108
Voted
LCPC
2001
Springer
15 years 8 months ago
Probabilistic Points-to Analysis
Information gathered by the existing pointer analysis techniques can be classified as must aliases or definitely-points-to relationships, which hold for all executions, and may a...
Yuan-Shin Hwang, Peng-Sheng Chen, Jenq Kuen Lee, R...
155
Voted
LCPC
1994
Springer
15 years 7 months ago
Optimizing Array Distributions in Data-Parallel Programs
Data parallel programs are sensitive to the distribution of data across processor nodes. We formulate the reduction of inter-node communication as an optimization on a colored gra...
Krishna Kunchithapadam, Barton P. Miller
166
Voted
OOPSLA
2010
Springer
15 years 1 months ago
From OO to FPGA: fitting round objects into square hardware?
Consumer electronics today such as cell phones often have one or more low-power FPGAs to assist with energyintensive operations in order to reduce overall energy consumption and i...
Stephen Kou, Jens Palsberg