Sciweavers

602 search results - page 113 / 121
» NetRaker suite: a demonstration
Sort
View
FSTTCS
2009
Springer
14 years 1 months ago
Functionally Private Approximations of Negligibly-Biased Estimators
ABSTRACT. We study functionally private approximations. An approximation function g is functionally private with respect to f if, for any input x, g(x) reveals no more information ...
André Madeira, S. Muthukrishnan
IWMM
2009
Springer
164views Hardware» more  IWMM 2009»
14 years 1 months ago
Live heap space analysis for languages with garbage collection
The peak heap consumption of a program is the maximum size of the live data on the heap during the execution of the program, i.e., the minimum amount of heap space needed to run t...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...
CF
2009
ACM
14 years 1 months ago
Mapping the LU decomposition on a many-core architecture: challenges and solutions
Recently, multi-core architectures with alternative memory subsystem designs have emerged. Instead of using hardwaremanaged cache hierarchies, they employ software-managed embedde...
Ioannis E. Venetis, Guang R. Gao
ISSTA
2009
ACM
14 years 1 months ago
Loop-extended symbolic execution on binary programs
Mixed concrete and symbolic execution is an important technique for finding and understanding software bugs, including securityrelevant ones. However, existing symbolic execution...
Prateek Saxena, Pongsin Poosankam, Stephen McCaman...
ICC
2008
IEEE
114views Communications» more  ICC 2008»
14 years 1 months ago
OCals: A Novel Overlay Construction Approach for Layered Streaming
—Layered streaming in overlay networks has drawn great interests since not only can it accomodate large scales of clients but also it handles client heterogeneities. However, to ...
Xin Xiao, Yuanchun Shi, Baopeng Zhang, Yuan Gao