X86 instructions

Results: 281



#Item
41On Subnormal Floating Point and Abnormal Timing Marc Andrysco,1 David Kohlbrenner,1 Keaton Mowery,1 Ranjit Jhala, Sorin Lerner, and Hovav Shacham Department of Computer Science and Engineering University of California, S

On Subnormal Floating Point and Abnormal Timing Marc Andrysco,1 David Kohlbrenner,1 Keaton Mowery,1 Ranjit Jhala, Sorin Lerner, and Hovav Shacham Department of Computer Science and Engineering University of California, S

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-30 16:46:44
42KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels John Criswell, Nathan Dautenhahn, and Vikram Adve Department of Computer Science University of Illinois at Urbana-Champaign Email: {criswell,d

KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels John Criswell, Nathan Dautenhahn, and Vikram Adve Department of Computer Science University of Illinois at Urbana-Champaign Email: {criswell,d

Add to Reading List

Source URL: sva.cs.illinois.edu

Language: English - Date: 2014-03-30 11:43:41
43Absoft Increases Fortran Performance With SSE4 on AMD and Intel Windows Systems Rochester Hills, MI., November 5, 2008 – Absoft(R) Corporation today announced Pro Fortran v10.2 which they state provides significant imp

Absoft Increases Fortran Performance With SSE4 on AMD and Intel Windows Systems Rochester Hills, MI., November 5, 2008 – Absoft(R) Corporation today announced Pro Fortran v10.2 which they state provides significant imp

Add to Reading List

Source URL: www.absoft.com

Language: English - Date: 2013-05-29 09:32:55
44

PDF Document

Add to Reading List

Source URL: www.pumpkininc.com

Language: English - Date: 2011-09-12 16:03:06
45Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:39
46Live Range Hole Allocation in Dynamic Binary Translation Wesley Attrot Daniel Nic´acio

Live Range Hole Allocation in Dynamic Binary Translation Wesley Attrot Daniel Nic´acio

Add to Reading List

Source URL: amas-bt.ece.utexas.edu

Language: English - Date: 1980-01-01 01:00:00
47Implementation and Evaluation of the Complex Streamed Instruction Set Ben Juurlink Dmitri Tcheressiz  

Implementation and Evaluation of the Complex Streamed Instruction Set Ben Juurlink Dmitri Tcheressiz 

Add to Reading List

Source URL: research.ac.upc.edu

Language: English - Date: 2002-03-20 08:47:55
48Classic algorithms for Pairwise Testing Andreas Rothmann Hochschule Offenburg  November 2008

Classic algorithms for Pairwise Testing Andreas Rothmann Hochschule Offenburg November 2008

Add to Reading List

Source URL: www.verifysoft.com

Language: English - Date: 2011-01-03 03:00:48
492011 12th International Workshop on Microprocessor Test and Verification  Automatic generation of software-based functional failing test for speed debug and on-silicon timing verification E. Sanchez *, G. Squillero *, A.

2011 12th International Workshop on Microprocessor Test and Verification Automatic generation of software-based functional failing test for speed debug and on-silicon timing verification E. Sanchez *, G. Squillero *, A.

Add to Reading List

Source URL: www.genetic-programming.org

Language: English - Date: 2012-06-28 00:31:22
50IA-32 Intel® Architecture Software Developer’s Manual Volume 1: Basic Architecture

IA-32 Intel® Architecture Software Developer’s Manual Volume 1: Basic Architecture

Add to Reading List

Source URL: www.ssw.uni-linz.ac.at

Language: English - Date: 2004-02-11 09:32:53