Binary code

Results: 292



#Item
81Compiler construction / Software engineering / Automatic parallelization / Loop optimization / Vectorization / Code generation / Parallel computing / Schedule / Polytope model / Compiler optimizations / Computing / Programming language theory

Transparent Parallelization of Binary Code Benoît Pradelle Alain Ketterlin Philippe Clauss

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2011-03-29 07:21:23
82Algorithm / Mathematical logic / Theoretical computer science / Advanced Encryption Standard / Depth-first search / Directed acyclic graph / Digital signature / Cryptography / Mathematics / Search algorithms

Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism Pierre Lestringant* Frédéric Guihéry*

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2015-05-07 04:40:10
83Automata theory / Pattern matching / Regular expression / C / Software engineering / Computing / Computer programming

Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism Pierre Lestringant AMOSSYS

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2015-05-07 04:40:19
84Mathematics / Linguistics / Data types / Elementary arithmetic / Primitive types / Binary-coded decimal / Binary numeral system / Binary code / Floating point / Computer arithmetic / Arithmetic / Binary arithmetic

BINARY NUMBER SYSTEM 4 An understanding of the binary number system is necessary before proceeding with a further examination of LGP-21 programming concepts. Each digit of a

Add to Reading List

Source URL: www.ed-thelen.org

Language: English - Date: 2008-07-23 04:19:34
85Computing / Data / Cyclic redundancy check / Universal Serial Bus / Network packet / Polynomial code / Communications protocol / Modulo operation / Transmission Control Protocol / Finite fields / Information / Binary arithmetic

Draft CYCLIC REDUNDANCY CHECKS IN USB Introduction The USB specification calls for the use of Cyclic Redundancy Checksums (CRC) to protect all non-PID fields in token and data packets from errors during transmission. Th

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2013-12-17 18:51:22
86Intel / Binary arithmetic / Vortex86 / Pulse-width modulation / Bitwise operation / Conventional PCI / Counter / Value / Lookup table / Computing / Electronics / IBM PC compatibles

Using PWM on the Vortex86 Application Note AP0104 (v1) [Publish Date] These DOS code examples were written and compiled using Borland Turbo C++. There is a download link for this compiler at http://cc.embarcadero.com/it

Add to Reading List

Source URL: www.dsl-ltd.co.uk

Language: English - Date: 2015-04-11 03:15:40
87Computer programming / PaX / Buffer overflow protection / Stack buffer overflow / Valgrind / Buffer overflow / Shellcode / X86 / Executable / Computing / Software bugs / Computer security

Randomized Instruction Set Emulation ∗ to Disrupt Binary Code Injection Attacks Elena Gabriela Barrantes David H. Ackley

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2003-09-09 13:38:33
88Binary tree / Interval tree / String / Interval / Exponentiation / Gray code / Integer / Code / Mathematics / Abstract algebra / Formal languages

Motivation Statement of the problem Dense-tree encodings Prefix rules and essential rules Bounds on the size of templates representing intervals Results

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2008-07-30 17:28:54
89Cherry Hill /  New Jersey / Melitta / Management information system / Minden / Database / Business / Economy of Germany / Technology / Information systems / Information technology management / Business software

binary code data flow, communication

Add to Reading List

Source URL: www.mik.de

Language: English - Date: 2011-03-17 08:31:07
90Central processing unit / Binary translation / Assembly language / Algorithm / Virtual machine / OpenVMS / Ring / Instruction set / DEC Alpha / Computing / Computer architecture / Programming language implementation

Is superoptimisation a viable technique for virtual machines? Abstract The term “optimisation” is typically used by computer scientists to refer to the improvement of the performance of code. Superoptimisation, first

Add to Reading List

Source URL: www.tomhume.org

Language: English
UPDATE