Sciweavers

1821 search results - page 278 / 365
» Security-Aware Program Transformations
Sort
View
112
Voted
JIT
2004
Springer
94views Database» more  JIT 2004»
15 years 6 months ago
Self-accounting as Principle for Portable CPU Control in Java
In this paper we present a novel scheme for portable CPU accounting and control in Java, which is based on program transformation techniques and can be used with every standard Jav...
Walter Binder, Jarle Hulaas
LPAR
2004
Springer
15 years 6 months ago
Second-Order Matching via Explicit Substitutions
Abstract. Matching is a basic operation extensively used in computation. Second-order matching, in particular, provides an adequate environment for expressing program transformatio...
Flávio L. C. de Moura, Fairouz Kamareddine,...
105
Voted
IEEEPACT
2003
IEEE
15 years 6 months ago
Compiler-Directed Content-Aware Prefetching for Dynamic Data Structures
This paper describes Compiler-Directed Content-Aware Prefetching (CDCAP), an integrated compiler and hardware approach for prefetching dynamic data structures. The approach utiliz...
Hassan Al-Sukhni, Ian Bratt, Daniel A. Connors
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 5 months ago
H2 performance of agreement protocol with noise: An edge based approach
— This work presents an H2 performance analysis of the agreement protocol in the presence of noise. The agreement protocol is first transformed into an equivalent system induced...
Daniel Zelazo, Mehran Mesbahi
CASES
2009
ACM
15 years 5 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...