Sciweavers

1448 search results - page 39 / 290
» Restricted Stack Implementations
Sort
View
ICCD
2004
IEEE
131views Hardware» more  ICCD 2004»
14 years 4 months ago
3D Processing Technology and Its Impact on iA32 Microprocessors
This short paper explores an implementation of a new technology called 3D die stacking and describes research activity at Intel. 3D die stacking is the bonding of two die either f...
Bryan Black, Donald Nelson, Clair Webb, Nick Samra
PDP
2009
IEEE
14 years 2 months ago
High Throughput Intra-Node MPI Communication with Open-MX
Abstract—The increasing number of cores per node in highperformance computing requires an efficient intra-node MPI communication subsystem. Most existing MPI implementations rel...
Brice Goglin
SAINT
2005
IEEE
14 years 1 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 2 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
SP
2000
IEEE
13 years 12 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum