Sciweavers

205 search results - page 4 / 41
» A research demonstration of code bubbles
Sort
View
FAST
2009
14 years 7 months ago
A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries for Storage
Over the past five years, large-scale storage installations have required fault-protection beyond RAID-5, leading to a flurry of research on and development of erasure codes for m...
James S. Plank, Jianqiang Luo, Catherine D. Schuma...
91
Voted
APCCAS
2006
IEEE
253views Hardware» more  APCCAS 2006»
15 years 3 months ago
Design of Optimal Decimation and Interpolation Filters for Low Bit-Rate Image Coding
— The DCT-based JPEG standard is certainly one of the most successful applications of transform coding methods for still digital images. A commonly recognized disadvantage of the...
Wu-Sheng Lu, A.-M. Sevcenco
100
Voted
EUROCRYPT
2007
Springer
15 years 3 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
85
Voted
FLAIRS
1998
14 years 10 months ago
The Program Analysis Tool for Reuse: Identifying Reusable Components
Software reuse has been demonstrated to increase productivity, reduce costs, and improve software quality. The research that has addressed this problem has concentrated on code cr...
Letha H. Etzkorn, Carl G. Davis, Lisa L. Bowen, Ja...
CGO
2006
IEEE
15 years 3 months ago
A Cross-Architectural Interface for Code Cache Manipulation
Software code caches help amortize the overhead of dynamic binary transformation by enabling reuse of transformed code. Since code caches contain a potentiallyaltered copy of ever...
Kim M. Hazelwood, Robert S. Cohn