Sciweavers

864 search results - page 44 / 173
» codes 2003
Sort
View
FSE
2004
Springer
130views Cryptology» more  FSE 2004»
15 years 3 months ago
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
A cryptanalysis is given of a MAC proposal presented at CRYPTO 2003 by Cary and Venkatesan. A nice feature of the CaryVenkatesan MAC is that a lower bound on its security can be pr...
Simon R. Blackburn, Kenneth G. Paterson
IEEEINTERACT
2003
IEEE
15 years 3 months ago
High Performance Code Generation through Lazy Activation Records
For call intensive programs, function calls are major bottlenecks during program execution since they usually force register contents to be spilled into memory. Such register to m...
Manoranjan Satpathy, Rabi N. Mahapatra, Siddharth ...
IPPS
2003
IEEE
15 years 3 months ago
Application/Kernel Cooperation Towards the Efficient Execution of Shared-Memory Parallel Java Codes
In this paper we propose mechanisms to improve the performance of parallel Java applications executing on multiprogrammed shared-memory multiprocessors. The proposal is based on a...
Jordi Guitart, Xavier Martorell, Jordi Torres, Edu...
IWPC
2003
IEEE
15 years 3 months ago
Generalized Selective XML Markup of Source Code Using Agile Parsing
Increasingly focus in the software comprehension community is shifting from representing the results of analysis in the graph and database domain to reflecting insights directly i...
James R. Cordy
SEW
2003
IEEE
15 years 3 months ago
Instrumentation of Intermediate Code for Runtime Verification
Runtime monitoring is aimed at ensuring correct runtime behavior with respect to specified constraints. It provides assurance that properties are maintained during a given program...
Ann Q. Gates, Oscar Mondragon, Mary Payne, Steve R...