Sciweavers

154 search results - page 17 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
99
Voted
ICIP
2008
IEEE
15 years 10 months ago
Macroblock-based retransmission for error-resilient video streaming
This paper revisits the problem of source-channel coding for error-resilient video streaming. We propose a new method to enable adaptive redundancy in the bitstream: fine-grain r...
J. Christian Schmidt, Kenneth Rose
127
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
When physical is not real enough
This position paper argues that policies for physical memory management and for memory power mode control should be relocated to the system software of a programmable memory manag...
Frank Bellosa
86
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
LA-MAC: A Load Adaptive MAC Protocol for MANETs
—The performance of prevalent MAC protocols in MANETs relies on the level of contention in networks. While contention-based MAC protocols such as CSMA suffer from inefficiency u...
Weihong Hu, Xiaolong Li, Homayoun Yousefi'zadeh
122
Voted
CASES
2007
ACM
15 years 7 months ago
Cache leakage control mechanism for hard real-time systems
Leakage energy consumption is an increasingly important issue as the technology continues to shrink. Since on-chip caches constitute a major portion of the processor's transi...
Jaw-Wei Chi, Chia-Lin Yang, Yi-Jung Chen, Jian-Jia...
158
Voted
EUROSYS
2010
ACM
16 years 23 days ago
Kivati: Fast Detection and Prevention of Atomicity Violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violat...
Lee Chew, David Lie