Sciweavers

146 search results - page 21 / 30
» Putting Pointer Analysis to Work
Sort
View
MICRO
2005
IEEE
117views Hardware» more  MICRO 2005»
14 years 1 months ago
A Quantum Logic Array Microarchitecture: Scalable Quantum Data Movement and Computation
Recent experimental advances have demonstrated technologies capable of supporting scalable quantum computation. A critical next step is how to put those technologies together into...
Tzvetan S. Metodi, Darshan D. Thaker, Andrew W. Cr...
ESORICS
2010
Springer
13 years 5 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
WCRE
2008
IEEE
14 years 1 months ago
FAMOOSr 2008: Workshop on FAMIX and Moose in Software Reengineering
The increasing amount of data available about software systems poses new challenges for re- and reverse engineering research, as the proposed approaches need to scale. In this con...
Stéphane Ducasse, Tudor Gîrba, Orla G...
CSCW
2002
ACM
13 years 7 months ago
NetWORKers and their Activity in Intensional Networks
Through ethnographic research, we document the rise of personal social networks in the workplace, which we call intensional networks. Paradoxically, we find that the most fundament...
Bonnie A. Nardi, Steve Whittaker, Heinrich Schwarz
CCGRID
2009
IEEE
14 years 2 months ago
Performance under Failures of DAG-based Parallel Computing
— As the scale and complexity of parallel systems continue to grow, failures become more and more an inevitable fact for solving large-scale applications. In this research, we pr...
Hui Jin, Xian-He Sun, Ziming Zheng, Zhiling Lan, B...