Withthe proliferationof software agents and smart hardware devices there is a growing realization that large-scale problems can be addressed by integration of such standalone syst...
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
The Super Iterator pattern, like the standard Iterator pattern, traverses an unknown data structure without exposing that structure. With the standard Iterator pattern, clients mu...
Abstract: For cost-effective realization of sizable realtime distributed computing application systems, significant advances in resource allocation are in critical needs. An advanc...
K. H. (Kane) Kim, Yuqing Li, Kee-Wook Rim, Eltefaa...
A design flow for processor platforms with on-chip coarse-grain reconfigurable logic is presented. The reconfigurable logic is realized by a 2-Dimensional Array of Processing Elem...
Michalis D. Galanis, Grigoris Dimitroulakos, Const...