Sciweavers

1585 search results - page 54 / 317
» Automatically optimizing secure computation
Sort
View
135
Voted
OSDI
2006
ACM
16 years 2 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
101
Voted
PRDC
1999
IEEE
15 years 6 months ago
Availability and Performance Evaluation for Automatic Protection Switching in TDMA Wireless System
In this paper, we compare the availability and performance of a wireless TDMA system with and without automatic protection switching. Stochastic reward net models are constructed ...
Hairong Sun, Yonghuan Cao, Kishor S. Trivedi, Jame...
128
Voted
IEEEPACT
2006
IEEE
15 years 7 months ago
Fast, automatic, procedure-level performance tuning
This paper presents an automated performance tuning solution, which partitions a program into a number of tuning sections and finds the best combination of compiler options for e...
Zhelong Pan, Rudolf Eigenmann
104
Voted
ICCS
2003
Springer
15 years 7 months ago
Self-Adapting Numerical Software and Automatic Tuning of Heuristics
Self-Adapting Numerical Software (SANS) systems aim to bridge the knowledge gap that exists between the expertise of domain scientists, and the know-how that is needed to fulfill...
Jack Dongarra, Victor Eijkhout
CVPR
2006
IEEE
16 years 3 months ago
Automatic Cast Listing in Feature-Length Films with Anisotropic Manifold Space
Our goal is to automatically determine the cast of a feature-length film. This is challenging because the cast size is not known, with appearance changes of faces caused by extrin...
Ognjen Arandjelovic, Roberto Cipolla