enter search term and/or author name
Bit-split string-matching engines for intrusion detection and prevention
Brett Brotherton, Lin Tan, Timothy Sherwood
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network and at the heart of almost every modern intrusion detection system is a string-matching...
Efficient remote profiling for resource-constrained devices
Chandra Krintz, Timothy Sherwood, Priya Nagpurkar, Hussam Mousa
The widespread use of ubiquitous, mobile, and continuously connected computing agents has inspired software developers to change the way they test, debug, and optimize software. Users now play an active role in the software evolution cycle by...
Recovery code generation for general speculative optimizations
Pen-Chung Yew, Roy Dz-Ching Ju, Tin-Fook Ngai, Wei-Chung Hsu, Jin Lin
A general framework that integrates both control and data speculation using alias profiling and/or compiler heuristic rules has shown to improve CPU2000 performance on Itanium systems. However, speculative optimizations require check instructions and...
Optimal register reassignment for register stack overflow minimization
Yoonseo Choi, Hwansoo Han
Architectures with a register stack can implement efficient calling conventions. Using the overlapping of callers' and callees' registers, callers are able to pass parameters to callees without a memory stack. The most recent instance of a register...