Sciweavers

254 search results - page 32 / 51
» Memory copies in multi-level memory systems
Sort
View
IANDC
2006
77views more  IANDC 2006»
13 years 7 months ago
Lower and upper bounds on obtaining history independence
Abstract. History independent data structures, presented by Micciancio, are data structures that possess a strong security property: even if an intruder manages to get a copy of th...
Niv Buchbinder, Erez Petrank
EMSOFT
2007
Springer
14 years 1 months ago
Design and implementation of a comprehensive real-time java virtual machine
The emergence of standards for programming real-time systems in Java has encouraged many developers to consider its use for systems previously only built using C, Ada, or assembly...
Joshua S. Auerbach, David F. Bacon, Bob Blainey, P...
DSD
2006
IEEE
98views Hardware» more  DSD 2006»
13 years 11 months ago
Profiling Bluetooth and Linux on the Xilinx Virtex II Pro
In this paper, we present profiling results of the Bluetooth standard implemented on the Xilinx Virtex II Pro device. The investigation is performed in two stages. First, we solel...
Filipa Duarte, Stephan Wong
SMI
2005
IEEE
14 years 1 months ago
Designing with Distance Fields
Distance fields provide an implicit representation of shape that has advantages in many application areas; in this overview, we focus on their use in digital design. Distance fi...
Sarah F. Frisken, Ronald N. Perry
HUC
2010
Springer
13 years 5 months ago
A holistic multipurpose life-log framework
Life-log systems have a wide range of usages from memory augmentation to health monitoring. Recent advances in pervasive devices and sensor networks enable us to create tools that...
Reza Rawassizadeh