Sciweavers

120 search results - page 19 / 24
» Realistic Compilation by Partial Evaluation
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
PLDI
2005
ACM
15 years 3 months ago
Programming by sketching for bit-streaming programs
This paper introduces the concept of programming with sketches, an approach for the rapid development of high-performance applications. This approach allows a programmer to write ...
Armando Solar-Lezama, Rodric M. Rabbah, Rastislav ...
HPCA
1997
IEEE
15 years 1 months ago
Global Address Space, Non-Uniform Bandwidth: A Memory System Performance Characterization of Parallel Systems
Many parallel systems offer a simple view of memory: all storage cells are addresseduniformly. Despite a uniform view of the memory, the machines differsignificantly in theirmemo...
Thomas Stricker, Thomas R. Gross
PERCOM
2009
ACM
15 years 4 months ago
Persistent Content-based Information Dissemination in Hybrid Vehicular Networks
Abstract—Content-based information dissemination has a potential number of applications in vehicular networking, including advertising, traffic and parking notifications and em...
Ilias Leontiadis, Paolo Costa, Cecilia Mascolo
94
Voted
ESWS
2008
Springer
14 years 11 months ago
Viewing and Querying Topic Maps in terms of RDF
Both Topic Maps and RDF are popular semantic web standards designed for machine processing of web documents. Since these representations were originally created for different purpo...
Silvia Stefanova, Tore Risch