Sciweavers

1821 search results - page 265 / 365
» Security-Aware Program Transformations
Sort
View
118
Voted
PCI
2005
Springer
15 years 6 months ago
Tuning Blocked Array Layouts to Exploit Memory Hierarchy in SMT Architectures
Cache misses form a major bottleneck for memory-intensive applications, due to the significant latency of main memory accesses. Loop tiling, in conjunction with other program tran...
Evangelia Athanasaki, Kornilios Kourtis, Nikos Ana...
115
Voted
SEM
2004
Springer
15 years 6 months ago
Extending Standard Java Runtime Systems for Resource Management
Resource management is a precondition to build reliable, extensible middleware and to host potentially untrusted user components. Resource accounting allows to charge users for the...
Walter Binder, Jarle Hulaas
123
Voted
CCS
2003
ACM
15 years 6 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
82
Voted
IEEEPACT
2002
IEEE
15 years 5 months ago
Increasing and Detecting Memory Address Congruence
A static memory reference exhibits a unique property when its dynamic memory addresses are congruent with respect to some non-trivial modulus. Extraction of this congruence inform...
Samuel Larsen, Emmett Witchel, Saman P. Amarasingh...
116
Voted
WOMPAT
2001
Springer
15 years 5 months ago
Portable Compilers for OpenMP
Abstract. The recent parallel language standard for shared memory multiprocessor (SMP) machines, OpenMP, promises a simple and portable interface for programmers who wish to exploi...
Seung-Jai Min, Seon Wook Kim, Michael Voss, Sang I...