Sciweavers

582 search results - page 101 / 117
» Too Much Middleware
Sort
View
PLDI
2003
ACM
14 years 1 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik
SPAA
2003
ACM
14 years 1 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
ISCA
2010
IEEE
340views Hardware» more  ISCA 2010»
14 years 1 months ago
Necromancer: enhancing system throughput by animating dead cores
Aggressive technology scaling into the nanometer regime has led to a host of reliability challenges in the last several years. Unlike onchip caches, which can be efficiently prot...
Amin Ansari, Shuguang Feng, Shantanu Gupta, Scott ...
ICRA
2002
IEEE
136views Robotics» more  ICRA 2002»
14 years 28 days ago
Motion Dynamics of a Rover with Slip-Based Traction Model
This paper investigates kinetic behavior of a planetary rover with attention to tire-soil traction mechanics and articulated body dynamics, and thereby study the control when the ...
Kazuya Yoshida, Hiroshida Hamano