Sciweavers

1801 search results - page 214 / 361
» Pointing without a pointer
Sort
View
IPPS
2003
IEEE
15 years 3 months ago
Continuous Compilation: A New Approach to Aggressive and Adaptive Code Transformation
Over the past several decades, the compiler research community has developed a number of sophisticated and powerful algorithms for a varierty of code improvements. While there are...
Bruce R. Childers, Jack W. Davidson, Mary Lou Soff...
ISCA
2003
IEEE
183views Hardware» more  ISCA 2003»
15 years 3 months ago
The Jrpm System for Dynamically Parallelizing Java Programs
We describe the Java runtime parallelizing machine (Jrpm), a complete system for parallelizing sequential programs automatically. Jrpm is based on a chip multiprocessor (CMP) with...
Michael K. Chen, Kunle Olukotun
LCN
2003
IEEE
15 years 3 months ago
Secure and Manageable Virtual Private Networks for End-users
This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environm...
Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu A...
86
Voted
WIDM
2003
ACM
15 years 3 months ago
Datarover: a taxonomy based crawler for automated data extraction from data-intensive websites
The advent of e-commerce has created a trend that brought thousands of catalogs online. Most of these websites are “taxonomy-directed”. A Web site is said to be ``taxonomydire...
Hasan Davulcu, S. Koduri, Saravanakumar Nagarajan
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
15 years 3 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu