Sciweavers

205 search results - page 4 / 41
» A research demonstration of code bubbles
Sort
View
FAST
2009
13 years 3 months ago
A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries for Storage
Over the past five years, large-scale storage installations have required fault-protection beyond RAID-5, leading to a flurry of research on and development of erasure codes for m...
James S. Plank, Jianqiang Luo, Catherine D. Schuma...
APCCAS
2006
IEEE
253views Hardware» more  APCCAS 2006»
13 years 11 months ago
Design of Optimal Decimation and Interpolation Filters for Low Bit-Rate Image Coding
— The DCT-based JPEG standard is certainly one of the most successful applications of transform coding methods for still digital images. A commonly recognized disadvantage of the...
Wu-Sheng Lu, A.-M. Sevcenco
EUROCRYPT
2007
Springer
13 years 12 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
FLAIRS
1998
13 years 7 months ago
The Program Analysis Tool for Reuse: Identifying Reusable Components
Software reuse has been demonstrated to increase productivity, reduce costs, and improve software quality. The research that has addressed this problem has concentrated on code cr...
Letha H. Etzkorn, Carl G. Davis, Lisa L. Bowen, Ja...
CGO
2006
IEEE
13 years 11 months ago
A Cross-Architectural Interface for Code Cache Manipulation
Software code caches help amortize the overhead of dynamic binary transformation by enabling reuse of transformed code. Since code caches contain a potentiallyaltered copy of ever...
Kim M. Hazelwood, Robert S. Cohn