Sciweavers

1240 search results - page 213 / 248
» Improving Memory Management Security for C and C
Sort
View
SAC
2009
ACM
14 years 1 months ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
DAC
2008
ACM
14 years 9 months ago
Control theory-based DVS for interactive 3D games
We propose a control theory-based dynamic voltage scaling (DVS) algorithm for interactive 3D game applications running on batterypowered portable devices. Using this scheme, we pe...
Yan Gu, Samarjit Chakraborty
WWW
2007
ACM
14 years 9 months ago
Consistency-preserving caching of dynamic database content
With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffective. We describe...
Niraj Tolia, M. Satyanarayanan
MOBIHOC
2006
ACM
14 years 8 months ago
An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces
Vehicular ad hoc networks (VANETs) using WLAN technology have recently received considerable attention. The evaluation of VANET routing protocols often involves simulators since m...
Valery Naumov, Rainer Baumann, Thomas R. Gross
DAC
2009
ACM
14 years 3 months ago
Throughput optimal task allocation under thermal constraints for multi-core processors
It is known that temperature gradients and thermal hotspots affect the reliability of microprocessors. Temperature is also an important constraint when maximizing the performance...
Vinay Hanumaiah, Ravishankar Rao, Sarma B. K. Vrud...