Sciweavers

1024 search results - page 196 / 205
» High-Level Execution Time Analysis
Sort
View
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
14 years 4 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
ROBOCUP
2009
Springer
134views Robotics» more  ROBOCUP 2009»
14 years 4 months ago
Learning Complementary Multiagent Behaviors: A Case Study
As the reach of multiagent reinforcement learning extends to more and more complex tasks, it is likely that the diverse challenges posed by some of these tasks can only be address...
Shivaram Kalyanakrishnan, Peter Stone
AFRICACRYPT
2010
Springer
14 years 4 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
14 years 4 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
CGO
2007
IEEE
14 years 4 months ago
Ubiquitous Memory Introspection
Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to atta...
Qin Zhao, Rodric M. Rabbah, Saman P. Amarasinghe, ...