Sciweavers

2555 search results - page 182 / 511
» Quantifiers and Working Memory
Sort
View
ISSS
2002
IEEE
120views Hardware» more  ISSS 2002»
15 years 8 months ago
Optimal Message-Passing for Data Coherency in Distributed Architecture
Message-passing mechanism is commonly used to preserve data coherency in distributed systems. This paper presents an algorithm for insertion of minimal message-passing in system-l...
Daniel Gajski, Junyu Peng
105
Voted
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
15 years 8 months ago
Rebound Attack on Reduced-Round Versions of JH
Abstract. JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis results of JH by using rebound attack. ...
Vincent Rijmen, Deniz Toz, Kerem Varici
ASPDAC
2009
ACM
124views Hardware» more  ASPDAC 2009»
15 years 8 months ago
Thermal optimization in multi-granularity multi-core floorplanning
—Multi-core microarchitectures require a careful balance between many competing objectives to achieve the highest possible performance. Integrated Early Analysis is the considera...
Michael B. Healy, Hsien-Hsin S. Lee, Gabriel H. Lo...
123
Voted
EUROPAR
2001
Springer
15 years 8 months ago
Parallel Tree Projection Algorithm for Sequence Mining
Discovery of sequential patterns is becoming increasingly useful and essential in many scienti c and commercial domains. Enormous sizes of available datasets and possibly large nu...
Valerie Guralnik, Nivea Garg, George Karypis
125
Voted
POPL
1998
ACM
15 years 8 months ago
Alias Analysis of Executable Code
Recent years have seen increasing interest in systems that reason about and manipulate executable code. Such systems can generally benefit from information about aliasing. Unfort...
Saumya K. Debray, Robert Muth, Matthew Weippert