Sciweavers

1448 search results - page 45 / 290
» Restricted Stack Implementations
Sort
View
102
Voted
APLAS
2000
ACM
15 years 6 months ago
A New Criterion for Safe Program Transformations
Previous studies on safety of program transformations with respect to performance considered two criteria: preserving performance within a constant factor and preserving complexit...
Yasuhiko Minamide
ACSAC
2004
IEEE
15 years 5 months ago
Detecting Exploit Code Execution in Loadable Kernel Modules
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-modu...
Haizhi Xu, Wenliang Du, Steve J. Chapin
BIRTHDAY
2009
Springer
15 years 3 months ago
An ASM-Characterization of a Class of Distributed Algorithms
Conventional computation models restrict to particular data structures to represent states of a computation, e.g. natural numbers, s, stacks, etc. Gurevich's Abstract State Ma...
Andreas Glausch, Wolfgang Reisig
TSD
2010
Springer
15 years 1 hour ago
Correlation Features and a Linear Transform Specific Reproducing Kernel
Abstract. In this paper we introduce two ideas for phoneme classification: First, we derive the necessary steps to integrate linear transform into the computation of reproducing ke...
Andreas Beschorner, Dietrich Klakow
ICPP
1990
IEEE
15 years 6 months ago
Implementing Sequential Consistency in Cache-Based Systems
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of sequential consistency. For implementing sequential consistency in a cache-base...
Sarita V. Adve, Mark D. Hill