Sciweavers

1815 search results - page 37 / 363
» Dynamic Power Management Using Data Buffers
Sort
View
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
INFOCOM
2010
IEEE
13 years 6 months ago
Cooperative Resource Management in Cognitive WiMAX with Femto Cells
Abstract—WiMAX with femto cells is a cost-effective nextgeneration broadband wireless communication system. Cognitive Radio (CR) has recently emerged as a promising technology to...
Jin Jin, Baochun Li
JAVA
1999
Springer
14 years 6 days ago
Interfacing Java to the Virtual Interface Architecture
User-level network interfaces (UNIs) have reduced the overheads of communication by exposing the buffers used by the network interface DMA engine to the applications. This removes...
Chi-Chao Chang, Thorsten von Eicken
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 2 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
RTAS
2003
IEEE
14 years 1 months ago
Collaborative Operating System and Compiler Power Management for Real-Time Applications
Managing energy consumption has become vitally important to battery operated portable and embedded systems. A dynamic voltage scaling (DVS) technique reduces the processor’s dyn...
Nevine AbouGhazaleh, Daniel Mossé, Bruce R....