Sciweavers

4757 search results - page 823 / 952
» Monads for Functional Programming
Sort
View
145
Voted
ARCS
2008
Springer
15 years 5 months ago
An Optimized ZGEMM Implementation for the Cell BE
: The architecture of the IBM Cell BE processor represents a new approach for designing CPUs. The fast execution of legacy software has to stand back in order to achieve very high ...
Timo Schneider, Torsten Hoefler, Simon Wunderlich,...
139
Voted
ASIACRYPT
2008
Springer
15 years 5 months ago
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Abstract. The generic (aka. black-box) group model is a valuable methodology for analyzing the computational hardness of number-theoretic problems used in cryptography. Since the p...
Andy Rupp, Gregor Leander, Endre Bangerter, Alexan...
136
Voted
ASPDAC
2008
ACM
69views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Fast, quasi-optimal, and pipelined instruction-set extensions
Nowadays many customised embedded processors offer the possibility of speeding up an application by implementing it using Application-Specific Functional units (AFUs). However, th...
Ajay K. Verma, Philip Brisk, Paolo Ienne
121
Voted
ASWEC
2008
IEEE
15 years 5 months ago
Root Cause Analysis Using Sequence Alignment and Latent Semantic Indexing
Automatic identification of software faults has enormous practical significance. This requires characterizing program execution behavior. Equally important is the aspect of diagno...
R. P. Jagadeesh Chandra Bose, U. Suresh
116
Voted
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 5 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...