Sciweavers

1821 search results - page 214 / 365
» Security-Aware Program Transformations
Sort
View
CF
2009
ACM
14 years 4 months ago
High-performance SIMT code generation in an active visual effects library
SIMT (Single-Instruction Multiple-Thread) is an emerging programming paradigm for high-performance computational accelerators, pioneered in current and next generation GPUs and hy...
Jay L. T. Cornwall, Lee W. Howes, Paul H. J. Kelly...
IWPC
2006
IEEE
14 years 3 months ago
JComp: A Reuse-Driven Componentization Framework for Java Applications
Program componentization has been proved to be an effective way to increase the speed and cost-effectiveness of reusing, maintaining, and understanding existing software systems. ...
Shimin Li, Ladan Tahvildari
SCAM
2006
IEEE
14 years 3 months ago
Data Representation Alternatives in Semantically Augmented Numerical Models
Transformations of numerical source code may require the augmentation of the original variables with new data to represent additional data the transformed program operates on. Aut...
Michael W. Fagan, Laurent Hascoët, Jean Utke
IWIA
2005
IEEE
14 years 3 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
ICCS
2005
Springer
14 years 3 months ago
Automated Operation Minimization of Tensor Contraction Expressions in Electronic Structure Calculations
Abstract. Complex tensor contraction expressions arise in accurate electronic structure models in quantum chemistry, such as the Coupled Cluster method. Transformations using algeb...
Albert Hartono, Alexander Sibiryakov, Marcel Nooij...