Sciweavers

2313 search results - page 2 / 463
» On Heuristic Time Hierarchies
Sort
View
COMPSEC
2010
98views more  COMPSEC 2010»
13 years 8 months ago
Managing key hierarchies for access control enforcement: Heuristic approaches
Carlo Blundo, Stelvio Cimato, Sabrina De Capitani ...
VLSID
2002
IEEE
160views VLSI» more  VLSID 2002»
14 years 9 months ago
An Efficient Hierarchical Timing-Driven Steiner Tree Algorithm for Global Routing
In this paper, we propose a hierarchical timing-driven Steiner tree algorithm for global routing which considers the minimization of timing delay during the tree construction as t...
Jingyu Xu, Xianlong Hong, Tong Jing, Yici Cai, Jun...
CGO
2007
IEEE
14 years 2 months ago
Iterative Optimization in the Polyhedral Model: Part I, One-Dimensional Time
Emerging microprocessors offer unprecedented parallel computing capabilities and deeper memory hierarchies, increasing the importance of loop transformations in optimizing compile...
Louis-Noël Pouchet, Cédric Bastoul, Al...
ICS
2000
Tsinghua U.
14 years 3 days ago
Fast greedy weighted fusion
Loop fusion is important to optimizing compilers because it is an important tool in managing the memory hierarchy. By fusing loops that use the same data elements, we can reduce t...
Ken Kennedy
ACSAC
2008
IEEE
14 years 3 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri