Sciweavers

2340 search results - page 427 / 468
» Second quarter 2008
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
CDC
2008
IEEE
111views Control Systems» more  CDC 2008»
14 years 3 months ago
A separation principle for linear switching systems and parametrization of all stabilizing controllers
In this paper, we investigate the problem of designing a switching compensator for a plant switching amongst a (finite) family of given configurations (Ai,Bi,Ci). We assume that...
Franco Blanchini, Stefano Miani, Fouad Mesquine
CGO
2008
IEEE
14 years 3 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
COMPSAC
2008
IEEE
14 years 3 months ago
Ontology Model-Based Static Analysis on Java Programs
1 Typical enterprise and military software systems consist of millions of lines of code with complicated dependence on library abstractions. Manually debugging these codes imposes ...
Lian Yu, Jun Zhou, Yue Yi, Ping Li, Qianxiang Wang
DATE
2008
IEEE
145views Hardware» more  DATE 2008»
14 years 3 months ago
Minimizing Virtual Channel Buffer for Routers in On-chip Communication Architectures
We present a novel methodology for design space exploration using a two-steps scheme to optimize the number of virtual channel buffers (buffers take the premier share of the route...
Mohammad Abdullah Al Faruque, Jörg Henkel