Sciweavers

1688 search results - page 239 / 338
» Implementing Optimizations at Decode Time
Sort
View
WAC
2005
Springer
118views Communications» more  WAC 2005»
14 years 1 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
DATE
2010
IEEE
127views Hardware» more  DATE 2010»
14 years 1 months ago
A portable multi-pitch e-drum based on printed flexible pressure sensors
Pressure sensors are ideal candidates for implementing portable digital music instruments. Existing commercial pressure sensors, however, are not optimized to meet both timing and...
Chun-Ming Lo, Tsung-Ching Huang, Cheng-Yi Chiang, ...
CDC
2009
IEEE
141views Control Systems» more  CDC 2009»
14 years 26 days ago
Periodic power management schemes for real-time event streams
Abstract— Power dissipation has constrained the performance boosting of modern computer systems in the past decade. Dynamic power management (DPM) has been implemented in many sy...
Kai Huang, Luca Santinelli, Jian-Jia Chen, Lothar ...
ISCA
1998
IEEE
107views Hardware» more  ISCA 1998»
14 years 12 days ago
Memory Dependence Prediction Using Store Sets
For maximum performance, an out-of-order processor must issue load instructions as early as possible, while avoiding memory-order violations with prior store instructions that wri...
George Z. Chrysos, Joel S. Emer