Sciweavers

4330 search results - page 737 / 866
» Analyzing security architectures
Sort
View
ICCD
2008
IEEE
111views Hardware» more  ICCD 2008»
16 years 24 days ago
Power switch characterization for fine-grained dynamic voltage scaling
—Dynamic voltage scaling (DVS) provides power savings for systems with varying performance requirements. One low overhead implementation of DVS uses PMOS power switches to connec...
Liang Di, Mateja Putic, John Lach, Benton H. Calho...
ICCAD
2002
IEEE
103views Hardware» more  ICCAD 2002»
16 years 22 days ago
Synthesis of customized loop caches for core-based embedded systems
Embedded system programs tend to spend much time in small loops. Introducing a very small loop cache into the instruction memory hierarchy has thus been shown to substantially red...
Susan Cotterell, Frank Vahid
ICCAD
2001
IEEE
126views Hardware» more  ICCAD 2001»
16 years 22 days ago
Constraint Satisfaction for Relative Location Assignment and Scheduling
Tight data- and timing constraints are imposed by communication and multimedia applications. The architecture for the embedded processor imply resource constraints. Instead of ran...
Carlos A. Alba Pinto, Bart Mesman, Jochen A. G. Je...
123
Voted
SOSP
2003
ACM
16 years 22 days ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
CISIS
2010
IEEE
15 years 10 months ago
Scalability Analysis of Progressive Alignment on a Multicore
—Sequence alignment is a fundamental instrument in Bioinformatics. In recent years, numerous proposals have been addressing the problem of accelerating this class of applications...
Sebastian Isaza, Friman Sánchez, Georgi Gay...