Sciweavers

18374 search results - page 37 / 3675
» Applications for data hiding
Sort
View
INTERNET
2010
170views more  INTERNET 2010»
13 years 8 months ago
Developing RESTful Web Services with Webmachine
bstractions and mechanisms Webmachine supplies to RESTful Web services developers. Not Your Typical Framework Web services frameworks typically fall into one of the following broad...
Justin Sheehy, Steve Vinoski
MICRO
2008
IEEE
88views Hardware» more  MICRO 2008»
14 years 4 months ago
Facelift: Hiding and slowing down aging in multicores
Processors progressively age during their service life due to normal workload activity. Such aging results in gradually slower circuits. Anticipating this fact, designers add timi...
Abhishek Tiwari, Josep Torrellas
ASPLOS
2004
ACM
14 years 3 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande

Publication
260views
12 years 9 months ago
Alternative Astronomical FITS Imaging
Some important information on images of radio sources, such as radio flux and the noise of the map, is not easily accessible by astronomers other than radio astronomers, unless the...
E.E. Varsaki, N.A.B. Gizani, V. Fotopoulos and A.N...
ICPADS
2006
IEEE
14 years 3 months ago
Loop Scheduling with Complete Memory Latency Hiding on Multi-core Architecture
The widening gap between processor and memory performance is the main bottleneck for modern computer systems to achieve high processor utilization. In this paper, we propose a new...
Chun Xue, Zili Shao, Meilin Liu, Mei Kang Qiu, Edw...