Sciweavers

689 search results - page 80 / 138
» The multithreaded version of FORM
Sort
View
MSR
2006
ACM
14 years 1 months ago
Using evolutionary annotations from change logs to enhance program comprehension
Evolutionary annotations are descriptions of how source code evolves over time. Typical source comments, given their static nature, are usually inadequate for describing how a pro...
Daniel M. Germán, Peter C. Rigby, Margaret-...
SAC
2006
ACM
14 years 1 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
STORAGESS
2006
ACM
14 years 1 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
ISCA
2005
IEEE
113views Hardware» more  ISCA 2005»
14 years 1 months ago
Piecewise Linear Branch Prediction
Improved branch prediction accuracy is essential to sustaining instruction throughput with today’s deep pipelines. We introduce piecewise linear branch prediction, an idealized ...
Daniel A. Jiménez
ITCC
2005
IEEE
14 years 1 months ago
Performance Analysis of Mobile Backbone Topology Synthesis Algorithm for Wireless Ad Hoc Networks
In this paper, we present a scalable fully distributed version of a Mobile Backbone Network Topology Synthesis Algorithm (MBN-TSA) for constructing and maintaining a dynamic backb...
Laura Huei-jiun Ju, Izhak Rubin