Sciweavers

1137 search results - page 201 / 228
» A study of slipstream processors
Sort
View
130
Voted
IH
2005
Springer
15 years 9 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
109
Voted
PACS
2004
Springer
112views Hardware» more  PACS 2004»
15 years 9 months ago
Low-Overhead Core Swapping for Thermal Management
Technology scaling trends and the limitations of packaging and cooling have intensified the need for thermally efficient architectures and architecture-level temperature managemen...
Eren Kursun, Glenn Reinman, Suleyman Sair, Anahita...
128
Voted
ACSAC
2003
IEEE
15 years 9 months ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman
118
Voted
CCGRID
2003
IEEE
15 years 9 months ago
Discretionary Caching for I/O on Clusters
I/O bottlenecks are already a problem in many largescale applications that manipulate huge datasets. This problem is expected to get worse as applications get larger, and the I/O ...
Murali Vilayannur, Anand Sivasubramaniam, Mahmut T...
130
Voted
ICAT
2003
IEEE
15 years 9 months ago
Distance Learning of Chang'an in an Immersive Environment
We have made a computer graphics model of Chang'an City when it was the capital of China during the Tang Dynasty (7-10th century). The real-time rendered images are projected...
Miho Kobayashi, Kei Utsugi, Masami Yamasaki, Haruo...