Sciweavers

478 search results - page 91 / 96
» Working Effectively with Legacy Code
Sort
View
MICRO
2005
IEEE
126views Hardware» more  MICRO 2005»
14 years 29 days ago
Cost Sensitive Modulo Scheduling in a Loop Accelerator Synthesis System
Scheduling algorithms used in compilers traditionally focus on goals such as reducing schedule length and register pressure or producing compact code. In the context of a hardware...
Kevin Fan, Manjunath Kudlur, Hyunchul Park, Scott ...
CIKM
2005
Springer
14 years 28 days ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
EMSOFT
2005
Springer
14 years 27 days ago
Optimizing inter-processor data locality on embedded chip multiprocessors
Recent research in embedded computing indicates that packing multiple processor cores on the same die is an effective way of utilizing the ever-increasing number of transistors. T...
Guilin Chen, Mahmut T. Kandemir
RAID
2005
Springer
14 years 26 days ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
ELPUB
2004
ACM
14 years 24 days ago
What academic libraries need from e-publishers
tions, allowing interlinking of abstracting and indexing databases with full-text sources, and providing the ability to search across multiple databases simultaneously. Publishers ...
Claire Dygert