First Page | Document Content | |
---|---|---|
Date: 2017-04-03 15:56:44Computer programming Computing Mathematics Theoretical computer science Boolean algebra Error detection and correction Compiler construction Hash function Avalanche effect Optimizing compiler Recursion MD5 | Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:Add to Reading ListSource URL: www.ieee-security.orgDownload Document from Source WebsiteFile Size: 637,30 KBShare Document on Facebook |
Optimizing Compiler for a CELL Processor Alexandre E. Eichenberger† , Kathryn O’Brien† , Kevin O’Brien† , Peng Wu† , Tong Chen† , Peter H. Oden† , Daniel A. Prener† , Janice C. Shepherd† , Byoungro SoDocID: 1t1Dk - View Document | |
Optimizations in a dynamic compiler © 2015 Oracle, Mario Wolczko Part 1 — OptimizingDocID: 1sZyS - View Document | |
Accurate prediction of the behavior of multithreaded applications in shared cachesDocID: 1rtkc - View Document | |
Precise Automatable Analytical Modeling of the Cache Behavior of Codes with Indirections ´ DOALLO DIEGO ANDRADE, BASILIO B. FRAGUELA, and RAMON Universidade da CorunaDocID: 1rqme - View Document | |
Computer Systems A Programmer’s Perspective, Second Edition 1 Randal E. Bryant David R. O’Hallaron January 13, 2010DocID: 1rmgs - View Document |