Sciweavers

852 search results - page 118 / 171
» Small Active Counters
Sort
View
IPCCC
1999
IEEE
14 years 2 months ago
Management policies for non-volatile write caches
Many computer hardware and software architectures buffer data in memory to improve system performance. Volatile disk or file caches are sometimes used to delay the propagation of ...
Theodore R. Haining, Darrell D. E. Long
MICRO
1999
IEEE
71views Hardware» more  MICRO 1999»
14 years 2 months ago
Selective Cache Ways: On-Demand Cache Resource Allocation
Increasing levels of microprocessor power dissipation call for new approaches at the architectural level that save energy by better matching of on-chip resources to application re...
David H. Albonesi
EUROCRYPT
1999
Springer
14 years 2 months ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
SIBGRAPI
1999
IEEE
14 years 2 months ago
Keeping an Eye for HCI
Advanced Human Computer Interaction (HCI) techniques are required to enhance current computer interfaces. In this paper we present an eye gaze tracking system based on a robust low...
Carlos Hitoshi Morimoto, David Koons, Arnon Amir, ...
ICRA
1998
IEEE
98views Robotics» more  ICRA 1998»
14 years 2 months ago
The Bow Leg Hopping Robot
The bow leg hopper is a novel locomotor design with a highly resilient leg that resembles an archer's bow. During flight, a "thrust" actuator adds elastic energy to...
Ben Brown, Garth Zeglin