Sciweavers

11217 search results - page 1757 / 2244
» Network Coding for Wireless Networks
Sort
View
NDSS
2000
IEEE
15 years 9 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
CODES
1998
IEEE
15 years 9 months ago
A hardware/software prototyping environment for dynamically reconfigurable embedded systems
Next generation embedded systems place new demands on an efficient methodology for their design and verification. These systems have to support interaction over a network, multipl...
Josef Fleischmann, Klaus Buchenrieder, Rainer Kres...
AINA
2006
IEEE
15 years 8 months ago
Accelerating HMMer searches on Opteron processors with minimally invasive recoding
HMMer is a widely used tool for protein sequence homology detection, as well as functional annotation of homologous protein sequences, and protein family classification. The HMMer...
Joseph I. Landman, Joydeep Ray, John Paul Walters
CODES
2001
IEEE
15 years 8 months ago
A trace transformation technique for communication refinement
Models of computation like Kahn and dataflow process networks provide convenient means for modeling signal processing applicahis is partly due to the abstract primitives that thes...
Paul Lieverse, Pieter van der Wolf, Ed F. Deprette...
DAGSTUHL
2006
15 years 6 months ago
Coxeter Lattice Paths
Supercomputing applications usually involve the repeated parallel application of discretized differential operators. Difficulties arise with higher-order discretizations their com...
Thomas J. Ashby, Anthony D. Kennedy, Stephen M. Wa...
« Prev « First page 1757 / 2244 Last » Next »