Sciweavers

1227 search results - page 177 / 246
» Remote Store Programming
Sort
View
132
Voted
ICTCS
2007
Springer
15 years 10 months ago
Analyzing Non-Interference with respect to Classes
The information flow property of Non-Interference was recently relaxed into Abstract NonInterference (ANI), a weakened version where attackers can only observe properties of data,...
Damiano Zanardini
IWMM
2007
Springer
130views Hardware» more  IWMM 2007»
15 years 10 months ago
Accordion arrays
In this work, we present accordion arrays, a straightforward and effective memory compression technique targeting Unicode-based character arrays. In many non-numeric Java programs...
Craig B. Zilles
CHES
2005
Springer
281views Cryptology» more  CHES 2005»
15 years 10 months ago
Data Remanence in Flash Memory Devices
Data remanence is the residual physical representation of data that has been erased or overwritten. In non-volatile programmable devices, such as UV EPROM, EEPROM or Flash, bits ar...
Sergei P. Skorobogatov
CC
2003
Springer
114views System Software» more  CC 2003»
15 years 9 months ago
Combined Code Motion and Register Allocation Using the Value State Dependence Graph
We define the Value State Dependence Graph (VSDG). The VSDG is a form of the Value Dependence Graph (VDG) extended by the addition of state dependence edges to model sequentialise...
Neil Johnson, Alan Mycroft
EGH
2003
Springer
15 years 9 months ago
Photon mapping on programmable graphics hardware
We present a modified photon mapping algorithm capable of running entirely on GPUs. Our implementation uses breadth-first photon tracing to distribute photons using the GPU. The...
Timothy J. Purcell, Craig Donner, Mike Cammarano, ...