Sciweavers

7124 search results - page 1305 / 1425
» Programming Languages and Operating Systems
Sort
View
126
Voted
SIGSOFT
2006
ACM
15 years 8 months ago
Using task context to improve programmer productivity
When working on a large software system, a programmer typically spends an inordinate amount of time sifting through thousands of artifacts to find just the subset of information n...
Mik Kersten, Gail C. Murphy
101
Voted
LCTRTS
2004
Springer
15 years 8 months ago
Finding effective compilation sequences
Most modern compilers operate by applying a fixed, program-independent sequence of optimizations to all programs. Compiler writers choose a single “compilation sequence”, or ...
L. Almagor, Keith D. Cooper, Alexander Grosul, Tim...
116
Voted
DATE
2003
IEEE
101views Hardware» more  DATE 2003»
15 years 8 months ago
Energy Estimation for Extensible Processors
This paper presents an efficient methodology for estimating the energy consumption of application programs running on extensible processors. Extensible processors, which are incr...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
129
Voted
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 6 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
124
Voted
CCS
2009
ACM
15 years 6 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
« Prev « First page 1305 / 1425 Last » Next »