Sciweavers

1963 search results - page 17 / 393
» How is aliasing used in systems software
Sort
View
LCPC
2000
Springer
14 years 16 days ago
Optimizing the Use of High Performance Software Libraries
Abstract. This paper describes how the use of software libraries, which is prevalent in high performance computing, can benefit from compiler optimizations in much the same way tha...
Samuel Z. Guyer, Calvin Lin
MA
1997
Springer
149views Communications» more  MA 1997»
14 years 1 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...
ASIACRYPT
2009
Springer
14 years 11 days ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
TCAD
2008
103views more  TCAD 2008»
13 years 8 months ago
Using Transfer-Resource Graph for Software-Based Verification of System-on-Chip
The verification of a system-on-chip is challenging due to its high level of integration. Multiple components in a system can behave concurrently and compete for resources. Hence, ...
Xiaoxi Xu, Cheng-Chew Lim
EUROMICRO
2007
IEEE
14 years 3 months ago
Using Model Differencing for Architecture-level Regression Testing
Regression testing can be systematically applied at the software architecture level in order to reduce the cost of retesting modified systems, and also to assess the regression t...
Henry Muccini