Sciweavers

154 search results - page 21 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
87
Voted
ICSE
2007
IEEE-ACM
15 years 9 months ago
Parallel Randomized State-Space Search
Model checkers search the space of possible program behaviors to detect errors and to demonstrate their absence. Despite major advances in reduction and optimization techniques, s...
Matthew B. Dwyer, Sebastian G. Elbaum, Suzette Per...
86
Voted
VTC
2006
IEEE
117views Communications» more  VTC 2006»
15 years 3 months ago
Monitoring the Position Integrity in Road Transport Localization Based Services
— Nowadays, a new generation of civil location based services (LBS) included in the intelligent road transport systems (ITS-R) field is emerging. The reliability of positioning ...
José Santa, Benito Úbeda Miña...
LCPC
2001
Springer
15 years 1 months ago
The Structure of a Compiler for Explicit and Implicit Parallelism
Abstract. We describe the structure of a compilation system that generates code for processor architectures supporting both explicit and implicit parallel threads. Such architectur...
Seon Wook Kim, Rudolf Eigenmann
EUROMICRO
1998
IEEE
15 years 1 months ago
Approaches for Scheduling of Triggered Transactions in Real-Time Active Database Systems
A real-time active database system (RTADBS) has to provide capabilities for timely trigger of timeconstrained transactions and at the same time to process them, concurrently with ...
Kam-yiu Lam, Tony S. H. Lee
CASES
2006
ACM
15 years 1 months ago
Power efficient branch prediction through early identification of branch addresses
Ever increasing performance requirements have elevated deeply pipelined architectures to a standard even in the embedded processor domain, requiring the incorporation of dynamic b...
Chengmo Yang, Alex Orailoglu