Sciweavers

93 search results - page 17 / 19
» The zen of nonvolatile memories
Sort
View
JTRES
2009
ACM
14 years 1 months ago
Replicating real-time garbage collector for Java
Real-time Java is becoming a viable platform for real-time applications, bringing new challenges to a garbage collector. A real-time collector has to be incremental as not to caus...
Tomás Kalibera
MSS
2005
IEEE
97views Hardware» more  MSS 2005»
14 years 29 days ago
Richer File System Metadata Using Links and Attributes
Traditional file systems provide a weak and inadequate structure for meaningful representations of file interrelationships and other context-providing metadata. Existing designs...
Alexander Ames, Carlos Maltzahn, Nikhil Bobb, Etha...
ISCA
2010
IEEE
413views Hardware» more  ISCA 2010»
14 years 14 days ago
Resistive computation: avoiding the power wall with low-leakage, STT-MRAM based computing
As CMOS scales beyond the 45nm technology node, leakage concerns are starting to limit microprocessor performance growth. To keep dynamic power constant across process generations...
Xiaochen Guo, Engin Ipek, Tolga Soyata
HOST
2009
IEEE
13 years 11 months ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
13 years 11 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...