Sciweavers

4278 search results - page 807 / 856
» Data prefetch mechanisms
Sort
View
119
Voted
MSS
2005
IEEE
62views Hardware» more  MSS 2005»
15 years 9 months ago
Predictive Reduction of Power and Latency (PuRPLe)
Increasing efforts have been aimed towards the management of power as a critical system resource, and the disk can consume approximately a third of the power required for a typica...
Matthew Craven, Ahmed Amer
159
Voted
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
15 years 9 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
140
Voted
VISUALIZATION
2005
IEEE
15 years 9 months ago
Exploring 2D Tensor Fields Using Stress Nets
In this article we describe stress nets, a technique for exploring 2D tensor fields. Our method allows a user to examine simultaneously the tensors' eigenvectors (both major ...
Andrew Wilson, Rebecca M. Brannon
AOSD
2005
ACM
15 years 9 months ago
abc: an extensible AspectJ compiler
Abstract. Research in the design of aspect-oriented programming languages requires a workbench that facilitates easy experimentation with new language features and implementation t...
Pavel Avgustinov, Aske Simon Christensen, Laurie J...
133
Voted
MSWIM
2005
ACM
15 years 9 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...