Sciweavers

245 search results - page 5 / 49
» Code Generation for Streaming: An Access Execute Mechanism
Sort
View
107
Voted
ISPASS
2006
IEEE
15 years 4 months ago
Improved stride prefetching using extrinsic stream characteristics
Stride-based prefetching mechanisms exploit regular streams of memory accesses to hide memory latency. While these mechanisms are effective, they can be improved by studying the p...
Hassan Al-Sukhni, James Holt, Daniel A. Connors
98
Voted
GCC
2007
Springer
15 years 1 days ago
Component Based Legacy Program Executing over Grid
Executing the legacy program over grid is very important and necessary. To reuse the legacy program, we developed a method based on Component for executing the legacy code. We can...
Le Du, Yongwei Wu, Chunlu Wang
97
Voted
CSFW
2009
IEEE
15 years 2 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
98
Voted
ACSAC
2000
IEEE
15 years 2 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
101
Voted
ICDE
2006
IEEE
127views Database» more  ICDE 2006»
15 years 4 months ago
Processing Recursive XQuery over XML Streams: The Raindrop Approach
— XML stream applications bring the challenge of efficiently processing queries on sequentially accessible tokenbased data. For efficient processing of queries, we need to ensu...
Mingzhu Wei, Ming Li, Elke A. Rundensteiner, Mural...