Sciweavers

685 search results - page 75 / 137
» Performance of Runtime Optimization on BLAST
Sort
View
CC
2008
Springer
127views System Software» more  CC 2008»
13 years 11 months ago
Compiler-Guaranteed Safety in Code-Copying Virtual Machines
1 Virtual Machine authors face a difficult choice between low performance, cheap interpreters, or specialized and costly compilers. A method able to bridge this wide gap is the exi...
Gregory B. Prokopski, Clark Verbrugge
LISP
2008
104views more  LISP 2008»
13 years 8 months ago
Flattening tuples in an SSA intermediate representation
For functional programs, unboxing aggregate data structures such as tuples removes memory indirections and frees dead components of the decoupled structures. To explore the consequ...
Lukasz Ziarek, Stephen Weeks, Suresh Jagannathan
DATE
2007
IEEE
157views Hardware» more  DATE 2007»
14 years 3 months ago
Energy evaluation of software implementations of block ciphers under memory constraints
Software implementations of modern block ciphers often require large lookup tables along with code size increasing optimizations like loop unrolling to reach peak performance on g...
Johann Großschädl, Stefan Tillich, Chri...
RAID
2007
Springer
14 years 3 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
14 years 2 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch