Sciweavers

1113 search results - page 58 / 223
» Counter Systems for Data Logics
Sort
View
ICCD
2006
IEEE
103views Hardware» more  ICCD 2006»
16 years 1 months ago
Architectural Support for Run-Time Validation of Control Flow Transfer
—Current micro-architecture blindly uses the address in the program counter to fetch and execute instructions without validating its legitimacy. Whenever this blind-folded instru...
Yixin Shi, Sean Dempsey, Gyungho Lee
CHES
2007
Springer
111views Cryptology» more  CHES 2007»
15 years 10 months ago
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay r...
Reouven Elbaz, David Champagne, Ruby B. Lee, Lione...
142
Voted
MIPS
2004
Springer
121views Multimedia» more  MIPS 2004»
15 years 9 months ago
Analysis of FEC Codes for Partially Reliable Media Broadcasting Schemes
With many multimedia delivery schemes a client does not necessarily receive a given media content entirely (e.g. router congestions can lead some information to be lost). Mechanism...
Christoph Neumann, Vincent Roca
131
Voted
LREC
2010
152views Education» more  LREC 2010»
15 years 5 months ago
Grammar Extraction from Treebanks for Hindi and Telugu
Grammars play an important role in many Natural Language Processing (NLP) applications. The traditional approach to creating grammars manually, besides being labor-intensive, has ...
Prasanth Kolachina, Sudheer Kolachina, Anil Kumar ...
DATESO
2006
148views Database» more  DATESO 2006»
15 years 5 months ago
Conceptual Modeling for XML: A Survey
Recently XML is the standard format used for the exchange of data between information systems and is also frequently applied as a logical database model. If we use XML as a logical...
Martin Necasky