Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,627,093 papers from all fields of science
Search
Sign In
Create Free Account
Branch table
Known as:
Branch (disambiguation)
, Jump table
In computer programming, a branch table or jump table is a method of transferring program control (branching) to another part of a program (or a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Algorithmic efficiency
Array data structure
Assembly language
Board representation (chess)
Expand
Broader (1)
Computer performance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Optimization of Single Pattern Matching Based on Sunday Algorithm
Tianxiao Xue
,
Qingbao Li
,
Z. Chen
,
Ye Wang
,
Peijun Feng
,
Nan Luo
IEEE International Conference on Communication…
2019
Corpus ID: 208206535
There are two problems exist in the application of Sunday algorithm to UTF-8 encoding in Chinese environment. For one thing, if…
Expand
2017
2017
User Co-scheduling for MPI+OpenMP Applications Using OpenMP Semantics
Antoine Capra
,
Patrick Carribault
,
Jean-Baptiste Besnard
,
A. Malony
,
Marc Pérache
,
J. Jaeger
International Workshop on OpenMP
2017
Corpus ID: 206704923
The evolution of parallel architectures towards machines with many-core processors and high node-level concurrency is putting an…
Expand
2013
2013
A new method based on the authentication path stack jump table generated
彭双和
,
刘吉强
,
覃应接
,
高昕炜
,
陈志阁
2013
Corpus ID: 126018728
The present invention relates to a new method based jump table generated authentication path stack, comprising the steps of: 1…
Expand
2011
2011
CRTS 2011 Proceedings of the 4 th Workshop on Compositional Theory and Technology for Real-Time Embedded Systems
Björn Andersson
,
T. Vardanega
,
+10 authors
Lothar
2011
Corpus ID: 17616514
The fundamental paradigms for the definition of Critical-Real Time Embedded Systems (CRTES) architectures are changing due to…
Expand
2009
2009
A Compiler-Hardware Technique for Protecting Against Buffer Overflow Attacks
Eugen Leontie
,
Gedare Bloom
,
Olga Gelbart
,
B. Narahari
,
R. Simha
2009
Corpus ID: 223143
Buffer overflow attacks are widely acknowledged by computer security professionals to be one of the greatest threats to the…
Expand
2006
2006
Jump Table Recovery Technique in IA-64 Binary Code Translation
Zhao Rong-cai
2006
Corpus ID: 63013400
In the translation of IA-64 binary code,one of the important problems is that of recognizing the switch statements implemented…
Expand
2002
2002
Demonstrating the Soft Detach Function With a PS/2 ® to USB Translator Example
R. Condit
2002
Corpus ID: 61628572
This Technical Brief describes the creation of a USB device that can enumerate as a mouse or as a keyboard, depending on which PS…
Expand
Review
2000
Review
2000
An Open-source Cryptographic Coprocessor Peter Gutmann
P. Gutmann
2000
Corpus ID: 16838614
Current crypto implementations rely on software running under general-purpose operating systems alongside a horde of untrusted…
Expand
1994
1994
Forth in mainstream computer science courses
R. Haskell
SIFN
1994
Corpus ID: 33438501
All computer science programs contain some type of course related to computer organization and assembly language programming. A…
Expand
1993
1993
Forth in mainsteam computer science courses
R. Haskell
Annual Workshop on Forth
1993
Corpus ID: 52856310