Sciweavers

1292 search results - page 193 / 259
» A Designer's Guide to KEMs
Sort
View
ISLPED
2004
ACM
122views Hardware» more  ISLPED 2004»
14 years 1 months ago
Microarchitectural techniques for power gating of execution units
Leakage power is a major concern in current and future microprocessor designs. In this paper, we explore the potential of architectural techniques to reduce leakage through power-...
Zhigang Hu, Alper Buyuktosunoglu, Viji Srinivasan,...
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ATAL
2004
Springer
14 years 1 months ago
Agent-Based Peer-to-Peer Service Networks: A Study of Effectiveness and Structure Evolution
We study peer-to-peer service networks consisting of autonomous agents who seek and provide services. To fulfill its local needs, an agent attempts to discover and select informa...
Yathiraj B. Udupi, Pinar Yolum, Munindar P. Singh
CC
2004
Springer
14 years 1 months ago
Using Multiple Memory Access Instructions for Reducing Code Size
An important issue in embedded systems design is the size of programs. As computing devices decrease in size, yet with more and more functions, better code size optimizations are i...
Neil Johnson, Alan Mycroft
ICWE
2004
Springer
14 years 1 months ago
Screen Readers Cannot See: Ontology Based Semantic Annotation for Visually Impaired Web Travellers
ct Travelling upon the Web is difficult for visually impaired users since the Web pages are designed for visual interaction [6]. Visually impaired users usually use screen readers...
Yeliz Yesilada, Simon Harper, Carole A. Goble, Rob...