Sciweavers

1938 search results - page 255 / 388
» Dependable Software
Sort
View
CGO
2006
IEEE
14 years 3 months ago
Compiler-directed Data Partitioning for Multicluster Processors
Multicluster architectures overcome the scaling problem of centralized resources by distributing the datapath, register file, and memory subsystem across multiple clusters connec...
Michael L. Chu, Scott A. Mahlke
CODES
2006
IEEE
14 years 3 months ago
Layout aware design of mesh based NoC architectures
Design of System-on-Chip (SoC) with regular mesh based Network-on-Chip (NoC) consists of mapping processing cores to routers, and routing of the traffic traces on the topology suc...
Krishnan Srinivasan, Karam S. Chatha
INFOCOM
2006
IEEE
14 years 3 months ago
On the Long-term Evolution of the Two-Tier Gnutella Overlay
— Peer-to-Peer (P2P) file sharing applications have witnessed a dramatic increase in popularity during the past few years. To accommodate the rapid growth in user population, de...
Amir H. Rasti, Daniel Stutzbach, Reza Rejaie
ISPASS
2006
IEEE
14 years 3 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 3 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...