Sciweavers

3902 search results - page 194 / 781
» Hardware Synthesis from C C Models
Sort
View
ISCA
2010
IEEE
214views Hardware» more  ISCA 2010»
15 years 6 months ago
Translation caching: skip, don't walk (the page table)
This paper explores the design space of MMU caches that accelerate virtual-to-physical address translation in processor architectures, such as x86-64, that use a radix tree page t...
Thomas W. Barr, Alan L. Cox, Scott Rixner
ML
2000
ACM
157views Machine Learning» more  ML 2000»
15 years 3 months ago
A Multistrategy Approach to Classifier Learning from Time Series
We present an approach to inductive concept learning using multiple models for time series. Our objective is to improve the efficiency and accuracy of concept learning by decomposi...
William H. Hsu, Sylvian R. Ray, David C. Wilkins
ASPLOS
2009
ACM
16 years 4 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 10 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
150
Voted
CAV
2011
Springer
234views Hardware» more  CAV 2011»
14 years 7 months ago
Resolution Proofs and Skolem Functions in QBF Evaluation and Applications
Abstract. Quantified Boolean formulae (QBF) allow compact encoding of many decision problems. Their importance motivated the development of fast QBF solvers. Certifying the result...
Valeriy Balabanov, Jie-Hong R. Jiang