Sciweavers

150 search results - page 8 / 30
» Evaluation of the Intel
Sort
View
DIMVA
2010
15 years 1 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
SCP
2011
305views Communications» more  SCP 2011»
14 years 6 months ago
DESOLA: An active linear algebra library using delayed evaluation and runtime code generation
Active libraries can be defined as libraries which play an active part in the compilation, in particular, the optimisation of their client code. This paper explores the implement...
Francis P. Russell, Michael R. Mellor, Paul H. J. ...
87
Voted
PLDI
2010
ACM
15 years 3 months ago
Evaluating Iterative Optimization across 1000 Data Sets
While iterative optimization has become a popular compiler optimization approach, it is based on a premise which has never been truly evaluated: that it is possible to learn the b...
Yang Chen, Yuanjie Huang, Lieven Eeckhout, Grigori...
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 5 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
SIGMETRICS
2005
ACM
156views Hardware» more  SIGMETRICS 2005»
15 years 5 months ago
Evaluating the impact of simultaneous multithreading on network servers using real hardware
This paper examines the performance of simultaneous multithreading (SMT) for network servers using actual hardware, multiple network server applications, and several workloads. Us...
Yaoping Ruan, Vivek S. Pai, Erich M. Nahum, John M...