Sciweavers

24 search results - page 5 / 5
» Integrating Abstract Caches with Symbolic Pipeline Analysis
Sort
View
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
14 years 26 days ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 3 months ago
Optimal Double Correlation Filtering for Carrier Frequency Offset Estimation in MIMO OFDM
Abstract— A computationally efficient optimal double correlation (ODC) filter, which works on the fourth order statistics of received samples, is proposed for carrier frequency...
Patrick Ho Wang Fung, Chin Keong Ho
ECRTS
2010
IEEE
13 years 10 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
DAGSTUHL
2006
13 years 10 months ago
Cognitive Vision Needs Attention to Link Sensing with Recognition
Abstract. "Cognitive computer vision is concerned with integration and control of vision systems using explicit but not necessarily symbolic models of context, situation and g...
John K. Tsotsos