Sciweavers

253 search results - page 20 / 51
» Imperative self-adjusting computation
Sort
View
ACMSE
2004
ACM
15 years 3 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
DAC
1995
ACM
15 years 3 months ago
Simultaneous Gate and Interconnect Sizing for Circuit-Level Delay Optimization
Abstract—With delays due to the physical interconnect dominating the overall logic path delays, circuit-level delay optimization must take interconnect effects into account. Inst...
Noel Menezes, Satyamurthy Pullela, Lawrence T. Pil...
RT
1995
Springer
15 years 3 months ago
Spatial Domain Characterization and Control of Reconstruction Errors
Reconstruction is imperative whenever an image or a volume needs to be resampled as a result of an affine or perspective transformation, texture mapping, or volume rendering. We p...
Raghu Machiraju, J. Edward Swan II, Roni Yagel
PPOPP
1991
ACM
15 years 3 months ago
Coarse-Grain Parallel Programming in Jade
This paper presents Jade, a language which allows a programmer to easily express dynamic coarse-grain parallelism. Starting with a sequential program, a programmer augments those ...
Monica S. Lam, Martin C. Rinard
NSDI
2008
15 years 2 months ago
Catching Instant Messaging Worms with Change-Point Detection Techniques
Instant messaging (IM) systems have gained a lot of popularity in recent years. The increasing number of IM users has lured malware authors to develop more worms and viruses that ...
Guanhua Yan, Zhen Xiao, Stephan Eidenbenz