Sciweavers

9888 search results - page 1924 / 1978
» compute 2009
Sort
View
ISORC
2009
IEEE
15 years 7 months ago
Embedded JIT Compilation with CACAO on YARI
Java is one of the most popular programming languages for the development of portable workstation and server applications available today. Because of its clean design and typesafe...
Florian Brandner, Tommy Thorn, Martin Schoeberl
103
Voted
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 7 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
118
Voted
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 7 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
MICRO
2009
IEEE
326views Hardware» more  MICRO 2009»
15 years 7 months ago
DDT: design and evaluation of a dynamic program analysis for optimizing data structure usage
Data structures define how values being computed are stored and accessed within programs. By recognizing what data structures are being used in an application, tools can make app...
Changhee Jung, Nathan Clark
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 7 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
« Prev « First page 1924 / 1978 Last » Next »