Sciweavers

298 search results - page 18 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
CORR
2006
Springer
98views Education» more  CORR 2006»
13 years 8 months ago
Enabling user-driven Checkpointing strategies in Reverse-mode Automatic Differentiation
This paper presents a new functionality of the Automatic Differentiation (AD) Tool tapenade. tapenade generates adjoint codes which are widely used for optimization or inverse prob...
Laurent Hascoët, Mauricio Araya-Polo
SC
2000
ACM
14 years 29 days ago
Parallel Unsteady Turbo-Pump Simulations For Liquid Rocket Engines
This paper reports the progress being made towards complete turbo-pump simulation capability for liquid rocket engines. The Space Shuttle Main Engine (SSME) turbo-pump impeller is...
Cetin C. Kiris, Dochan Kwak, William Chan
IEEEPACT
1998
IEEE
14 years 25 days ago
Parallelization of Benchmarks for Scalable Shared-Memory Multiprocessors
This work identifies practical compiling techniques for scalable shared memory machines. For this, we have focused on experimental studies using a real machine and representative ...
Yunheung Paek, Angeles G. Navarro, Emilio L. Zapat...
EDBT
2006
ACM
144views Database» more  EDBT 2006»
14 years 8 months ago
Towards Expressive Publish/Subscribe Systems
Traditional content based publish/subscribe (pub/sub) systems allow users to express stateless subscriptions evaluated on individual events. However, many applications such as moni...
Alan J. Demers, Johannes Gehrke, Mingsheng Hong, M...
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
14 years 21 days ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe