Sciweavers

1192 search results - page 172 / 239
» Computing Weakest Readings
Sort
View
133
Voted
EUROPAR
2007
Springer
15 years 10 months ago
Hardware Transactional Memory with Operating System Support, HTMOS
Abstract. Hardware Transactional Memory (HTM) gives software developers the opportunity to write parallel programs more easily compared to any previous programming method, and yiel...
Sasa Tomic, Adrián Cristal, Osman S. Unsal,...
MIDDLEWARE
2007
Springer
15 years 9 months ago
XenSocket: A High-Throughput Interdomain Transport for Virtual Machines
This paper presents the design and implementation of XenSocket, a UNIX-domain-socket-like construct for high-throughput interdomain (VM-to-VM) communication on the same system. The...
Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, J...
TAMC
2007
Springer
15 years 9 months ago
Finding a Duplicate and a Missing Item in a Stream
We consider the following problem in a stream model: Given a sequence a = a1, a2, . . . , am wich each ai ∈ [n] = {1, . . . , n} and m > n, find a duplicate in the sequence, ...
Jun Tarui
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 9 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
VMCAI
2007
Springer
15 years 9 months ago
DIVINE: DIscovering Variables IN Executables
Abstract. This paper addresses the problem of recovering variable-like entities when analyzing executables in the absence of debugging information. We show that variable-like entit...
Gogul Balakrishnan, Thomas W. Reps