Sciweavers

954 search results - page 73 / 191
» From brains to bytes
Sort
View
EUROPAR
2000
Springer
15 years 1 months ago
BitValue Inference: Detecting and Exploiting Narrow Bitwidth Computations
We present a compiler algorithm called BitValue, which can discover both unused and constant bits in dusty-deck C programs. BitValue uses forward and backward dataflow analyses, ge...
Mihai Budiu, Majd Sakr, Kip Walker, Seth Copen Gol...
MA
2000
Springer
104views Communications» more  MA 2000»
15 years 1 months ago
Portable Support for Transparent Thread Migration in Java
In this paper, we present a mechanism to capture and reestablish the state of Java threads. We achieve this by extracting a thread's execution state from the application code ...
Eddy Truyen, Bert Robben, Bart Vanhaute, Tim Conin...
SIGCOMM
1995
ACM
15 years 1 months ago
Performance of Checksums and CRCs over Real Data
Checksum and CRC algorithms have historically been studied under the assumption that the data fed to the algorithms was uniformly distributed. This paper examines the behavior of ...
Craig Partridge, James Hughes, Jonathan Stone
ASIACRYPT
2008
Springer
15 years 3 days ago
A New Attack on the LEX Stream Cipher
Abstract. In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher...
Orr Dunkelman, Nathan Keller
96
Voted
SIMUTOOLS
2008
14 years 11 months ago
Snapshot simulation of internet traffic: fast and accurate for heavy-tailed flows
Simulations involving processes at very different time scales can be so slow to converge that starting in one state and waiting for a representative sample of the state space to b...
R. G. Addie