Sciweavers

222 search results - page 32 / 45
» Nested Loops Revisited
Sort
View
WISTP
2007
Springer
14 years 1 months ago
Reverse Engineering Java Card Applets Using Power Analysis
Abstract. Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets revers...
Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjie...
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
14 years 1 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña
EUROPAR
2004
Springer
14 years 28 days ago
Architecture-Independent Meta-optimization by Aggressive Tail Splitting
Several optimization techniques are hindered by uncertainties about the control flow in a program, which can generally not be determined by static methods at compile time. We pres...
Michael Rock, Andreas Koch
EUROPAR
1999
Springer
13 years 11 months ago
I/O-Conscious Tiling for Disk-Resident Data Sets
This paper describes a tiling technique that can be used by application programmers and optimizing compilers to obtain I/O-efficient versions of regular scientific loop nests. Du...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
IFL
1999
Springer
117views Formal Methods» more  IFL 1999»
13 years 11 months ago
On Code Generation for Multi-generator WITH-Loops in SAC
Abstract. Most array operations in Sac are specified in terms of so-called withloops, a Sac-specific form of array comprehension. Due to the map-like semantics of with-loops its ...
Clemens Grelck, Dietmar Kreye, Sven-Bodo Scholz