Sciweavers

2945 search results - page 558 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ISCA
2012
IEEE
260views Hardware» more  ISCA 2012»
13 years 6 months ago
A case for exploiting subarray-level parallelism (SALP) in DRAM
Modern DRAMs have multiple banks to serve multiple memory requests in parallel. However, when two requests go to the same bank, they have to be served serially, exacerbating the h...
Yoongu Kim, Vivek Seshadri, Donghyuk Lee, Jamie Li...
TVCG
2012
210views Hardware» more  TVCG 2012»
13 years 6 months ago
Scalable Multivariate Volume Visualization and Analysis Based on Dimension Projection and Parallel Coordinates
—In this paper, we present an effective and scalable system for multivariate volume data visualization and analysis with a novel transfer function interface design that tightly c...
Hanqi Guo, He Xiao, Xiaoru Yuan
SIGMETRICS
2012
ACM
283views Hardware» more  SIGMETRICS 2012»
13 years 6 months ago
Renewable and cooling aware workload management for sustainable data centers
The demand for data center computing increased significantly in recent years resulting in huge energy consumption. Data centers typically comprise three main subsystems: IT equip...
Zhenhua Liu, Yuan Chen, Cullen Bash, Adam Wierman,...
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 4 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
135
Voted
PLDI
2006
ACM
15 years 10 months ago
Practical dynamic software updating for C
Software updates typically require stopping and restarting an application, but many systems cannot afford to halt service, or would prefer not to. Dynamic software updating (DSU) ...
Iulian Neamtiu, Michael W. Hicks, Gareth Stoyle, M...