Sciweavers

1448 search results - page 45 / 290
» Restricted Stack Implementations
Sort
View
APLAS
2000
ACM
13 years 12 months ago
A New Criterion for Safe Program Transformations
Previous studies on safety of program transformations with respect to performance considered two criteria: preserving performance within a constant factor and preserving complexit...
Yasuhiko Minamide
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Exploit Code Execution in Loadable Kernel Modules
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-modu...
Haizhi Xu, Wenliang Du, Steve J. Chapin
BIRTHDAY
2009
Springer
13 years 8 months ago
An ASM-Characterization of a Class of Distributed Algorithms
Conventional computation models restrict to particular data structures to represent states of a computation, e.g. natural numbers, s, stacks, etc. Gurevich's Abstract State Ma...
Andreas Glausch, Wolfgang Reisig
TSD
2010
Springer
13 years 5 months ago
Correlation Features and a Linear Transform Specific Reproducing Kernel
Abstract. In this paper we introduce two ideas for phoneme classification: First, we derive the necessary steps to integrate linear transform into the computation of reproducing ke...
Andreas Beschorner, Dietrich Klakow
ICPP
1990
IEEE
13 years 11 months ago
Implementing Sequential Consistency in Cache-Based Systems
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of sequential consistency. For implementing sequential consistency in a cache-base...
Sarita V. Adve, Mark D. Hill