Sciweavers

2479 search results - page 179 / 496
» A Computational Theory of Working Memory
Sort
View
CCR
2002
112views more  CCR 2002»
13 years 9 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
VLSID
2003
IEEE
123views VLSI» more  VLSID 2003»
14 years 9 months ago
Synthesis of Real-Time Embedded Software by Timed Quasi-Static Scheduling
A formal synthesis method for complex real-time embedded software is proposed in this work. Compared to previous work, our method not only synthesizes embedded software with compl...
Pao-Ann Hsiung, Feng-Shi Su
CCS
2008
ACM
13 years 11 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
TPDS
2008
97views more  TPDS 2008»
13 years 9 months ago
Solving Systems of Linear Equations on the CELL Processor Using Cholesky Factorization
: The STI CELL processor introduces pioneering solutions in processor architecture. At the same time it presents new challenges for the development of numerical algorithms. One is ...
Jakub Kurzak, Alfredo Buttari, Jack Dongarra
COGSCI
2004
78views more  COGSCI 2004»
13 years 9 months ago
Varieties of sameness: the impact of relational complexity on perceptual comparisons
The fundamental relations that underlie cognitive comparisons--"same" and "different"--can be demultiple levels of abstraction, which vary in relational comple...
James K. Kroger, Keith J. Holyoak, John E. Hummel