Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,551,817 papers from all fields of science
Search
Sign In
Create Free Account
Branch table
Known as:
Branch (disambiguation)
, Jump table
In computer programming, a branch table or jump table is a method of transferring program control (branching) to another part of a program (or a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Algorithmic efficiency
Array data structure
Assembly language
Board representation (chess)
Expand
Broader (1)
Computer performance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Neuromorphic Technologies for Next-Generation Cognitive Computing
P. Narayanan
,
G. Burr
,
S. Ambrogio
,
R. Shelby
International Memory Workshop
2017
Corpus ID: 47410852
With the end of Dennard scaling and the consequent slow-down of Moore's law, researchers are looking to exploit new device…
Expand
2016
2016
Accelerating machine learning with Non-Volatile Memory: Exploring device and circuit tradeoffs
Alessandro Fumarola
,
P. Narayanan
,
+6 authors
G. Burr
International Conference on Rebooting Computing
2016
Corpus ID: 17638506
Large arrays of the same nonvolatile memories (NVM) being developed for Storage-Class Memory (SCM) - such as Phase Change Memory…
Expand
2013
2013
The Method of Distribute Data Storage and Location on Weights of Jump Table
Bilin Shao
,
G. Bian
,
Zhang Weiqi
2013
Corpus ID: 62237475
2009
2009
Tiny module-linking for energy-efficient reprogramming in wireless sensor networks
Seungku Kim
,
Jae-Ho Lee
,
Kyeong Hur
,
Kwang-il Hwang
,
D. Eom
IEEE transactions on consumer electronics
2009
Corpus ID: 206633651
The remote and automatic reprogramming is an indispensable part in the wireless sensor networks. Especially, the energy saving…
Expand
2009
2009
A Compiler-Hardware Technique for Protecting Against Buffer Overflow Attacks
Eugen Leontie
,
Gedare Bloom
,
Olga Gelbart
,
B. Narahari
,
R. Simha
2009
Corpus ID: 223143
Buffer overflow attacks are widely acknowledged by computer security professionals to be one of the greatest threats to the…
Expand
Review
2009
Review
2009
Portable executable automatic protection using dynamic infection and code redirection
Mohab U. AbdelHameed
,
M. Sobh
,
A. M. Bahaa Eldin
International Conference on Communication and…
2009
Corpus ID: 15111821
This paper describes an automated technique for protecting portable executable files used in Windows NT Platform. The proposed…
Expand
2007
2007
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Ram Kumar
,
Akhilesh Singhania
,
Andrew Castner
,
E. Kohler
,
M. Srivastava
44th ACM/IEEE Design Automation Conference
2007
Corpus ID: 3807860
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device…
Expand
2003
2003
Preliminary Experiments in Hardcoding Finite Automata
E. Ngassam
,
B. Watson
,
D. Kourie
International Conference on Implementation and…
2003
Corpus ID: 27139358
Various experiments in hardcoding a single row of a transition table of a finite state machine directly into symbol- recognizing…
Expand
2000
2000
Conservative garbage collection for general memory allocators
Gustavo Rodriguez-Rivera
,
Michael Spertus
,
Charles Fiterman
International Symposium on Mathematical…
2000
Corpus ID: 6724686
This paper explains a technique that integrates conservative garbage collection on top of general memory allocators. This is…
Expand
1982
1982
Hash table methods for case statements
J. Gait
ACM-SE 20
1982
Corpus ID: 15565996
The CASE statement evaluates an expression, selects an action according to the value of the expression and then executes the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE