Sciweavers

4482 search results - page 731 / 897
» The Crowdsourcing Design Space
Sort
View
CASES
2001
ACM
14 years 24 days ago
The emerging power crisis in embedded processors: what can a poor compiler do?
It is widely acknowledged that even as VLSI technology advances, there is a looming crisis that is an important obstacle to the widespread deployment of mobile embedded devices, n...
Lakshmi N. Chakrapani, Pinar Korkmaz, Vincent John...
CGO
2003
IEEE
14 years 24 days ago
METRIC: Tracking Down Inefficiencies in the Memory Hierarchy via Binary Rewriting
In this paper, we present METRIC, an environment for determining memory inefficiencies by examining data traces. METRIC is designed to alter the performance behavior of applicatio...
Jaydeep Marathe, Frank Mueller, Tushar Mohan, Bron...
EUROCRYPT
2000
Springer
14 years 22 days ago
Authenticated Key Exchange Secure against Dictionary Attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, ...
Mihir Bellare, David Pointcheval, Phillip Rogaway
FAABS
2000
Springer
14 years 22 days ago
From Livingstone to SMV
To ful ll the needs of its deep space exploration program, NASAis actively supporting research and development in autonomy software. However, the reliable and cost-e ective develop...
Charles Pecheur, Reid G. Simmons
OOPSLA
2000
Springer
14 years 21 days ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg