Sciweavers

24529 search results - page 4807 / 4906
» Computing on Authenticated Data
Sort
View
ICMI
2003
Springer
111views Biometrics» more  ICMI 2003»
15 years 7 months ago
Distributed and local sensing techniques for face-to-face collaboration
This paper describes techniques that allow users to collaborate on tablet computers that employ distributed sensing techniques to establish a privileged connection between devices...
Ken Hinckley
108
Voted
DATE
2010
IEEE
157views Hardware» more  DATE 2010»
15 years 7 months ago
RMOT: Recursion in model order for task execution time estimation in a software pipeline
Abstract—This paper addresses the problem of execution time estimation for tasks in a software pipeline independent of the application structure or the underlying architecture. A...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 7 months ago
ERSA: Error Resilient System Architecture for probabilistic applications
There is a growing concern about the increasing vulnerability of future computing systems to errors in the underlying hardware. Traditional redundancy techniques are expensive for...
Larkhoon Leem, Hyungmin Cho, Jason Bau, Quinn A. J...
ISCA
2010
IEEE
205views Hardware» more  ISCA 2010»
15 years 7 months ago
The virtual write queue: coordinating DRAM and last-level cache policies
In computer architecture, caches have primarily been viewed as a means to hide memory latency from the CPU. Cache policies have focused on anticipating the CPU’s data needs, and...
Jeffrey Stuecheli, Dimitris Kaseridis, David Daly,...
122
Voted
ISCA
2010
IEEE
305views Hardware» more  ISCA 2010»
15 years 7 months ago
Rethinking DRAM design and organization for energy-constrained multi-cores
DRAM vendors have traditionally optimized the cost-perbit metric, often making design decisions that incur energy penalties. A prime example is the overfetch feature in DRAM, wher...
Aniruddha N. Udipi, Naveen Muralimanohar, Niladris...
« Prev « First page 4807 / 4906 Last » Next »