Sciweavers

24 search results - page 5 / 5
» Combined Control Flow Dominated and Data Flow Dominated High...
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 5 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
13 years 10 months ago
DAGS: Distribution agnostic sequential Monte Carlo scheme for task execution time estimation
This paper addresses the problem of stochastic task execution time estimation agnostic to the process distributions. The proposed method is orthogonal to the application structure ...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
IPPS
2009
IEEE
13 years 12 months ago
High-order stencil computations on multicore clusters
Stencil computation (SC) is of critical importance for broad scientific and engineering applications. However, it is a challenge to optimize complex, highorder SC on emerging clus...
Liu Peng, Richard Seymour, Ken-ichi Nomura, Rajiv ...
CASES
2010
ACM
13 years 3 months ago
Resource recycling: putting idle resources to work on a composable accelerator
Mobile computing platforms in the form of smart phones, netbooks, and personal digital assistants have become an integral part of our everyday lives. Moving ahead to the future, m...
Yongjun Park, Hyunchul Park, Scott A. Mahlke, Sukj...