Sciweavers

419 search results - page 20 / 84
» A Control-Theoretic Approach to Flow Control
Sort
View
82
Voted
COMPSAC
2009
IEEE
15 years 6 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
CGO
2005
IEEE
15 years 5 months ago
Superword-Level Parallelism in the Presence of Control Flow
In this paper, we describe how to extend the concept of superword-level parallelization (SLP), used for multimedia extension architectures, so that it can be applied in the presen...
Jaewook Shin, Mary W. Hall, Jacqueline Chame
74
Voted
EMSOFT
2005
Springer
15 years 5 months ago
Centralized end-to-end flow control in a best-effort network-on-chip
Run-time communication management in a Network-on-Chip (NoC) is a challenging task. On one hand, the NoC needs to satisfy the communication requirements (e.g. throughput) of runni...
Prabhat Avasare, Vincent Nollet, Jean-Yves Mignole...
ACCV
2009
Springer
15 years 6 months ago
Crowd Flow Characterization with Optimal Control Theory
Abstract. Analyzing the crowd dynamics from video sequences is an open challenge in computer vision. Under a high crowd density assumption, we characterize the dynamics of the crow...
Pierre Allain, Nicolas Courty, Thomas Corpetti
ACSAC
2008
IEEE
15 years 6 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...