Sciweavers

180 search results - page 8 / 36
» Exploiting Agent-Oriented Programming for Developing Android...
Sort
View
CGO
2007
IEEE
15 years 6 months ago
Exploiting Narrow Accelerators with Data-Centric Subgraph Mapping
The demand for high performance has driven acyclic computation accelerators into extensive use in modern embedded and desktop architectures. Accelerators that are ideal from a sof...
Amir Hormati, Nathan Clark, Scott A. Mahlke
ICSE
2005
IEEE-ACM
16 years 13 days ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
SC
2003
ACM
15 years 5 months ago
Identifying and Exploiting Spatial Regularity in Data Memory References
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses fo...
Tushar Mohan, Bronis R. de Supinski, Sally A. McKe...
COMPSAC
2003
IEEE
15 years 5 months ago
An Object-Passing Model for Parallel Programming
This paper introduces an object-passing model for parallel and distributed application development. Object passing provides the object-oriented application developer with powerful...
Jameela Al-Jaroodi, Nader Mohamed
JMLR
2012
13 years 2 months ago
Approximate Inference in Additive Factorial HMMs with Application to Energy Disaggregation
This paper considers additive factorial hidden Markov models, an extension to HMMs where the state factors into multiple independent chains, and the output is an additive function...
J. Zico Kolter, Tommi Jaakkola