Sciweavers

7225 search results - page 1190 / 1445
» On the Computational Power of Biochemistry
Sort
View
USS
2008
15 years 4 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
WSC
2008
15 years 4 months ago
Data Farming around the world overview
Data Farming combines the rapid prototyping capability inherent in certain simulation models with the exploratory power of high performance computing to rapidly generate insight i...
Gary E. Horne, Klaus-Peter Schwierz
AISC
2008
Springer
15 years 4 months ago
Search Techniques for Rational Polynomial Orders
Polynomial interpretations are a standard technique used in almost all tools for proving termination of term rewrite systems (TRSs) automatically. Traditionally, one applies interp...
Carsten Fuhs, Rafael Navarro-Marset, Carsten Otto,...
APLAS
2008
ACM
15 years 4 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
ARCS
2008
Springer
15 years 4 months ago
An Optimized ZGEMM Implementation for the Cell BE
: The architecture of the IBM Cell BE processor represents a new approach for designing CPUs. The fast execution of legacy software has to stand back in order to achieve very high ...
Timo Schneider, Torsten Hoefler, Simon Wunderlich,...
« Prev « First page 1190 / 1445 Last » Next »