Sciweavers

270 search results - page 6 / 54
» A Phase Change Memory as a Secure Main Memory
Sort
View
ICNP
2009
IEEE
13 years 5 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
ASPLOS
1998
ACM
13 years 12 months ago
Compiler-Controlled Memory
Optimizations aimed at reducing the impact of memory operations on execution speed have long concentrated on improving cache performance. These efforts achieve a reasonable level...
Keith D. Cooper, Timothy J. Harvey
PPOPP
2009
ACM
14 years 8 months ago
Transactional memory with strong atomicity using off-the-shelf memory protection hardware
This paper introduces a new way to provide strong atomicity in an implementation of transactional memory. Strong atomicity lets us offer clear semantics to programs, even if they ...
Martín Abadi, Tim Harris, Mojtaba Mehrara
DAMON
2007
Springer
14 years 1 months ago
The five-minute rule twenty years later, and how flash memory changes the rules
In 1987, Gray and Putzolo presented the five-minute rule, which was reviewed and renewed ten years later in 1997. With the advent of flash memory in the gap between traditional RA...
Goetz Graefe
CORR
2007
Springer
100views Education» more  CORR 2007»
13 years 7 months ago
Finite Volume Analysis of Nonlinear Thermo-mechanical Dynamics of Shape Memory Alloys
In this paper, the finite volume method is developed to analyze coupled dynamic problems of nonlinear thermoelasticity. The major focus is given to the description of martensitic ...
Linxiang X. Wang, Roderick V. N. Melnik