Sciweavers

3872 search results - page 310 / 775
» The Java memory model
Sort
View
IWIA
2005
IEEE
15 years 9 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
137
Voted
BIOADIT
2004
Springer
15 years 7 months ago
Biologically Plausible Speech Recognition with LSTM Neural Nets
Abstract. Long Short-Term Memory (LSTM) recurrent neural networks (RNNs) are local in space and time and closely related to a biological model of memory in the prefrontal cortex. N...
Alex Graves, Douglas Eck, Nicole Beringer, Jü...
CCGRID
2003
IEEE
15 years 7 months ago
Kernel Level Speculative DSM
Interprocess communication (IPC) is ubiquitous in today's computing world. One of the simplest mechanisms for IPC is shared memory. We present a system that enhances the Syst...
Cristian Tapus
ASAP
1997
IEEE
92views Hardware» more  ASAP 1997»
15 years 7 months ago
Optimized software synthesis for synchronous dataflow
This paper reviews a set of techniques for compiling dataflow-based, graphical programs for embedded signal processing applications into efficient implementations on programmable ...
Shuvra S. Bhattacharyya, Praveen K. Murthy, Edward...
ICASSP
2011
IEEE
14 years 7 months ago
Efficient context adaptive entropy coding for real-time applications
Context based entropy coding has the potential to provide higher gain over memoryless entropy coding. However serious difficulties arise regarding the practical implementation in...
Guillaume Fuchs, Vignesh Subbaraman, Markus Multru...