Sciweavers

871 search results - page 122 / 175
» How Realistic is Realism
Sort
View
CC
2007
Springer
157views System Software» more  CC 2007»
14 years 1 months ago
New Algorithms for SIMD Alignment
Optimizing programs for modern multiprocessor or vector platforms is a major important challenge for compilers today. In this work, we focus on one challenging aspect: the SIMD ALI...
Liza Fireman, Erez Petrank, Ayal Zaks
EUROPAR
2007
Springer
14 years 1 months ago
Virtualization Techniques in Network Emulation Systems
The continuous increase of computational power has made viable the implementation of more and more sophisticated virtualization techniques. The use of virtualization in cluster env...
Roberto Canonico, Pasquale Di Gennaro, Vittorio Ma...
INEX
2007
Springer
14 years 1 months ago
Overview of the INEX 2007 Entity Ranking Track
Abstract. Many realistic user tasks involve the retrieval of specific entities instead of just any type of documents. Examples of information needs include ‘Countries where one ...
Arjen P. de Vries, Anne-Marie Vercoustre, James A....
RTA
2007
Springer
14 years 1 months ago
Rewriting Approximations for Fast Prototyping of Static Analyzers
This paper shows how to construct static analyzers using tree automata and rewriting techniques. Starting from a term rewriting system representing the operational semantics of the...
Yohan Boichut, Thomas Genet, Thomas P. Jensen, Luk...
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
14 years 1 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...