Sciweavers

2512 search results - page 432 / 503
» Software Transactional Memory
Sort
View
CHES
2009
Springer
200views Cryptology» more  CHES 2009»
14 years 9 months ago
Accelerating AES with Vector Permute Instructions
We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid data- and key-dependent branches and mem...
Mike Hamburg
CHI
2005
ACM
14 years 9 months ago
Participatory design of an orientation aid for amnesics
We present the participatory design and evaluation of an orientation aid for individuals who have anterograde amnesia. Our design team included six amnesics who have extreme diffi...
Mike Wu, Ronald Baecker, Brian Richards
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
14 years 9 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
CHI
2003
ACM
14 years 9 months ago
Information voyeurism: social impact of physically large displays on information privacy
A common observation when working on physically large displays, such as wall-sized projection, is that a certain amount of information privacy is lost. A common explanation for th...
Desney S. Tan, Mary Czerwinski
EDBT
2008
ACM
188views Database» more  EDBT 2008»
14 years 9 months ago
FAME-DBMS: Tailor-made Data Management Solutions for Embedded Systems
Data management functionality is not only needed in large-scale server systems, but also in embedded systems. Resource restrictions and heterogeneity of hardware, however, complic...
Marko Rosenmüller, Norbert Siegmund, Horst Sc...