Sciweavers

3202 search results - page 464 / 641
» Memory access scheduling
Sort
View
PARA
2004
Springer
14 years 1 months ago
Improving the Performance of Large-Scale Unstructured PDE Applications
Abstract. This paper investigates two types of overhead due to duplicated local computations, which are frequently encountered in the parallel software of overlapping domain decomp...
Xing Cai
PATMOS
2004
Springer
14 years 1 months ago
SoftExplorer: Estimation, Characterization, and Optimization of the Power and Energy Consumption at the Algorithmic Level
We present SoftExplorer, a tool to estimate and analyze the power and energy consumption of an algorithm from the C program. The consumption of every loop is analyzed, and the inď¬...
Eric Senn, Johann Laurent, Nathalie Julien, Eric M...
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
SDMW
2004
Springer
14 years 1 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
IEEEINTERACT
2003
IEEE
14 years 1 months ago
Compiler-Directed Resource Management for Active Code Regions
Recent studies on program execution behavior reveal that a large amount of execution time is spent in small frequently executed regions of code. Whereas adaptive cache management ...
Ravikrishnan Sree, Alex Settle, Ian Bratt, Daniel ...