Sciweavers

2631 search results - page 472 / 527
» Less is More
Sort
View
QEST
2006
IEEE
14 years 4 months ago
Causality, Responsibility, and Blame: A Structural-Model Approach
This talk will provide an overview of work that I have done with Hana Chockler, Orna Kupferman, and Judea Pearl [1, 2, 10, 9] on defining notions such as causality, explanation, ...
Joseph Y. Halpern
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 4 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
ACMMSP
2006
ACM
252views Hardware» more  ACMMSP 2006»
14 years 4 months ago
Deconstructing process isolation
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping, and differentiated user and kernel instructions....
Mark Aiken, Manuel Fähndrich, Chris Hawblitze...
ASPDAC
2006
ACM
120views Hardware» more  ASPDAC 2006»
14 years 4 months ago
A novel framework for multilevel full-chip gridless routing
— Due to its great flexibility, gridless routing is desirable for nanometer circuit designs that use variable wire widths and spacings. Nevertheless, it is much more difficult ...
Tai-Chen Chen, Yao-Wen Chang, Shyh-Chang Lin
ASPLOS
2006
ACM
14 years 4 months ago
Software-based instruction caching for embedded processors
While hardware instruction caches are present in virtually all general-purpose and high-performance microprocessors today, many embedded processors use SRAM or scratchpad memories...
Jason E. Miller, Anant Agarwal