Sciweavers

987 search results - page 125 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
ACMMSP
2006
ACM
257views Hardware» more  ACMMSP 2006»
14 years 2 months ago
Memory models for open-nested transactions
Open nesting provides a loophole in the strict model of atomic transactions. Moss and Hosking suggested adapting open nesting for transactional memory, and Moss and a group at Sta...
Kunal Agrawal, Charles E. Leiserson, Jim Sukha
PERCOM
2007
ACM
14 years 8 months ago
Overhearing the Wireless Interface for 802.11-Based Positioning Systems
Not only the communication capabilities of 802.11, but also the capability to determine the position of mobile devices make 802.11 highly appealing for many application areas. Typ...
Thomas King, Thomas Haenselmann, Stephan Kopf, Wol...
ASAP
2004
IEEE
115views Hardware» more  ASAP 2004»
14 years 20 days ago
Design of the QBIC Wearable Computing Platform
Wearable computing systems can be broadly defined as mobile electronic devices that can be unobtrusively embedded in a user's outfit as part of the garment or an accessory. U...
Oliver Amft, Michael Lauffer, Stijn Ossevoort, Fab...
HPCA
2011
IEEE
13 years 19 days ago
HAQu: Hardware-accelerated queueing for fine-grained threading on a chip multiprocessor
Queues are commonly used in multithreaded programs for synchronization and communication. However, because software queues tend to be too expensive to support finegrained paralle...
Sanghoon Lee, Devesh Tiwari, Yan Solihin, James Tu...
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
13 years 8 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....