Sciweavers

1594 search results - page 127 / 319
» Visualizing Program Executions on Large Data Sets
Sort
View
IEEEARES
2010
IEEE
15 years 9 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
MICRO
2003
IEEE
116views Hardware» more  MICRO 2003»
15 years 8 months ago
Universal Mechanisms for Data-Parallel Architectures
Data-parallel programs are both growing in importance and increasing in diversity, resulting in specialized processors targeted at specific classes of these programs. This paper ...
Karthikeyan Sankaralingam, Stephen W. Keckler, Wil...
GRID
2007
Springer
15 years 9 months ago
Data placement for scientific applications in distributed environments
— Scientific applications often perform complex computational analyses that consume and produce large data sets. We are concerned with data placement policies that distribute dat...
Ann L. Chervenak, Ewa Deelman, Miron Livny, Mei-Hu...
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 3 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
AAAI
1996
15 years 4 months ago
Supporting Performance and Configuration Management of GTE Cellular Networks
GTE Laboratories, in cooperation with GTE Mobilnet, has developed and deployed PERFFEX (PERFormance Expert), an intelligent system for performance and configuration management of ...
Ming Tan, Carol Lafond, Gabriel Jakobson, Gary You...