Sciweavers

4281 search results - page 6 / 857
» How to Disembed a Program
Sort
View
JSA
2006
131views more  JSA 2006»
13 years 7 months ago
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used
Interprocedural data flow analyses of executable programs suffer from the conservative assumptions that need to be made because no precise control flow graph is available and beca...
Bjorn De Sutter, Bruno De Bus, Koen De Bosschere
OOPSLA
1993
Springer
13 years 11 months ago
How to Get a Paper Accepted at OOPSLA (Panel)
iam Pugh. Advice to authors of extended abstracts. http://www.acm.org/sigplan/conferences/author-info/pughadvice.html. [7] Mary Shaw. Writing good software engineering research pap...
Ralph E. Johnson, Kent Beck, Grady Booch, William ...
SODA
2003
ACM
122views Algorithms» more  SODA 2003»
13 years 8 months ago
Certifying and repairing solutions to large LPs how good are LP-solvers?
State-of-the-art linear programming (LP) solvers give solutions without any warranty. Solutions are not guaranteed to be optimal or even close to optimal. Of course, it is general...
Marcel Dhiflaoui, Stefan Funke, Carsten Kwappik, K...
OSDI
2000
ACM
13 years 8 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
IEICET
2006
84views more  IEICET 2006»
13 years 7 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda