Sciweavers

5343 search results - page 961 / 1069
» Keyword programming in java
Sort
View
CCS
2011
ACM
14 years 2 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
CSE
2011
IEEE
14 years 2 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...
AOSD
2012
ACM
13 years 10 months ago
A closer look at aspect interference and cooperation
In this work we consider specification and compositional verification for interference detection when several aspects are woven together under joint-weaving semantics without re...
Cynthia Disenfeld, Shmuel Katz
ASPDAC
2012
ACM
253views Hardware» more  ASPDAC 2012»
13 years 10 months ago
An integrated and automated memory optimization flow for FPGA behavioral synthesis
Behavioral synthesis tools have made significant progress in compiling high-level programs into register-transfer level (RTL) specifications. But manually rewriting code is still ...
Yuxin Wang, Peng Zhang, Xu Cheng, Jason Cong
DAC
2012
ACM
13 years 4 months ago
On software design for stochastic processors
Much recent research [8, 6, 7] suggests significant power and energy benefits of relaxing correctness constraints in future processors. Such processors with relaxed constraints ...
Joseph Sloan, John Sartori, Rakesh Kumar