Sciweavers

1528 search results - page 271 / 306
» Implementing Generalized Operator Overloading
Sort
View
EUROSYS
2009
ACM
14 years 5 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle usersā€™ conļ¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
EUROSYS
2007
ACM
14 years 5 months ago
Removing the memory limitations of sensor networks with flash-based virtual memory
Virtual memory has been successfully used in diļ¬€erent domains to extend the amount of memory available to applications. We have adapted this mechanism to sensor networks, where,...
Andreas Lachenmann, Pedro José Marró...
ICCAD
2003
IEEE
148views Hardware» more  ICCAD 2003»
14 years 5 months ago
The Compositional Far Side of Image Computation
Symbolic image computation is the most fundamental computation in BDD-based sequential system optimization and formal veriļ¬cation. In this paper, we explore the use of over-appr...
Chao Wang, Gary D. Hachtel, Fabio Somenzi
CGO
2010
IEEE
14 years 3 months ago
Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bi
For memory constrained embedded systems code size is at least as important as performance. One way of increasing code density is to exploit compact instruction formats, e.g. ARM T...
Tobias J. K. Edler von Koch, Igor Böhm, Bj&ou...
CCS
2010
ACM
14 years 3 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall