Sciweavers

837 search results - page 58 / 168
» codes 2000
Sort
View
PADL
2000
Springer
14 years 9 days ago
A Logic-Based Information System
In this article we present the University of Evora's Integrated Information System (SIIUE), which is meant to model most of the information necessary for the management and da...
Salvador Abreu
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...
CL
2000
Springer
14 years 10 days ago
Certification of Compiler Optimizations Using Kleene Algebra with Tests
We use Kleene algebra with tests to verify a wide assortment of common compiler optimizations, including dead code elimination, common subexpression elimination, copy propagation,...
Dexter Kozen, Maria-Christina Patron
ISORC
2000
IEEE
14 years 1 months ago
Experimentation in CPU Control with Real-Time Java
This paper describes experiences in using an O.O. language (Java) in designing, prototyping and evaluating a CPU manager. QoS Animator facilitates the execution of object oriented...
Gerasimos Xydas, Jerome Tassel
EUROPAR
2000
Springer
14 years 10 days ago
A Statistical-Empirical Hybrid Approach to Hierarchical Memory Analysis
A hybrid approach that utilizes both statistical techniques and empirical methods seeks to provide more information about the performance of an application. In this paper, we prese...
Xian-He Sun, Kirk W. Cameron