Sciweavers

5962 search results - page 957 / 1193
» Working with Patterns and Code
Sort
View
VEE
2005
ACM
203views Virtualization» more  VEE 2005»
15 years 10 months ago
Inlining java native calls at runtime
We introduce a strategy for inlining native functions into JavaTM applications using a JIT compiler. We perform further optimizations to transform inlined callbacks into semantica...
Levon Stepanian, Angela Demke Brown, Allan Kielstr...
WCFLP
2005
ACM
15 years 10 months ago
Lightweight program specialization via dynamic slicing
Program slicing is a well-known technique that extracts from a program those statements which are relevant to a particular criterion. While static slicing does not consider any in...
Claudio Ochoa, Josep Silva, Germán Vidal
ACIVS
2005
Springer
15 years 10 months ago
Reduced-Bit, Full Search Block-Matching Algorithms and Their Hardware Realizations
Abstract. The Full Search Block-Matching Motion Estimation (FSBME) algorithm is often employed in video coding for its regular dataflow and straightforward architectures. By iterat...
Vincent M. Dwyer, Shahrukh Agha, Vassilios A. Chou...
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
15 years 10 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...
CCS
2005
ACM
15 years 10 months ago
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on...
Onur Aciiçmez, Werner Schindler, Çet...