Sciweavers

1412 search results - page 208 / 283
» The Value of Outsourced Software
Sort
View
CASES
2009
ACM
15 years 10 months ago
Optimal loop parallelization for maximizing iteration-level parallelism
This paper solves the open problem of extracting the maximal number of iterations from a loop that can be executed in parallel on chip multiprocessors. Our algorithm solves it opt...
Duo Liu, Zili Shao, Meng Wang, Minyi Guo, Jingling...
CEC
2008
IEEE
15 years 10 months ago
On the generality of the evolved driving rules of an agent operating a model of a car
—We present an approach for automated evolutionary design of the functionary of driving agent, able to operate a software model of fast running car. The objective of our work is ...
Hirotaka Yamazaki, Ivan Tanev, Tomoyuki Hiroyasu, ...
ICASSP
2008
IEEE
15 years 10 months ago
Speech privacy for modern mobile communication systems
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...
ICONS
2008
IEEE
15 years 10 months ago
An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three
DL systems with bilinear structure recently became an important base for cryptographic protocols such as identity-based encryption (IBE). Since the main computational task is the ...
Giray Kömürcü, Erkay Savas
IEEEARES
2008
IEEE
15 years 10 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto