Sciweavers

331 search results - page 19 / 67
» Limits on Multiple Instruction Issue
Sort
View
CRYPTO
1994
Springer
128views Cryptology» more  CRYPTO 1994»
14 years 27 days ago
Linear Cryptanalysis Using Multiple Approximations
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limit...
Burton S. Kaliski Jr., Matthew J. B. Robshaw
SIGCOMM
2009
ACM
14 years 3 months ago
Accountability in hosted virtual networks
Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual networks...
Eric Keller, Ruby B. Lee, Jennifer Rexford
DATE
2009
IEEE
138views Hardware» more  DATE 2009»
14 years 3 months ago
Hardware/software co-design architecture for thermal management of chip multiprocessors
—The sustained push for performance, transistor count, and instruction level parallelism has reached a point where chip level power density issues are at the forefront of design ...
Omer Khan, Sandip Kundu
CASES
2003
ACM
14 years 2 months ago
Compiler optimization and ordering effects on VLIW code compression
Code size has always been an important issue for all embedded applications as well as larger systems. Code compression techniques have been devised as a way of battling bloated co...
Montserrat Ros, Peter Sutton
SIGCSE
1992
ACM
178views Education» more  SIGCSE 1992»
14 years 26 days ago
A graphical computer simulator for systems programming courses
on through abstract instructions which approximate, but do not duplicate, the behavior of actual machines. Because they are designed for use in a variety of educational settings, C...
Mark Newsome, Cherri M. Pancake