Sciweavers

1040 search results - page 202 / 208
» Resource Usage Verification
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
EUROPAR
2010
Springer
13 years 8 months ago
Optimized Dense Matrix Multiplication on a Many-Core Architecture
Abstract. Traditional parallel programming methodologies for improving performance assume cache-based parallel systems. However, new architectures, like the IBM Cyclops-64 (C64), b...
Elkin Garcia, Ioannis E. Venetis, Rishi Khan, Guan...
ISLPED
2010
ACM
183views Hardware» more  ISLPED 2010»
13 years 7 months ago
A pareto-algebraic framework for signal power optimization in global routing
This paper proposes a framework for (signal) interconnect power optimization at the global routing stage. In a typical design flow, the primary objective of global routing is mini...
Hamid Shojaei, Tai-Hsuan Wu, Azadeh Davoodi, Twan ...
SIGCOMM
2010
ACM
13 years 7 months ago
Flexible multimedia content retrieval using InfoNames
Multimedia content is a dominant fraction of Internet usage today. At the same time, there is significant heterogeneity in video presentation modes and operating conditions of Int...
Arun Kumar, Ashok Anand, Aditya Akella, Athula Bal...
SIGCOMM
2010
ACM
13 years 7 months ago
LokVaani: demonstrating interactive voice in Lo3
In this work, we consider the goal of enabling effective voice communication in a TDMA, multi-hop mesh network, using low cost and low power platforms. We consider two primary usa...
Vijay Gabale, Bhaskaran Raman, Kameswari Chebrolu,...