Sciweavers

595 search results - page 20 / 119
» Using Constraints with Memory to Implement Variable Eliminat...
Sort
View
AINA
2008
IEEE
13 years 9 months ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
CCS
2008
ACM
13 years 9 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
ICRA
2003
IEEE
225views Robotics» more  ICRA 2003»
14 years 20 days ago
Post-stabilization for rigid body simulation with contact and constraints
— Rigid body dynamics with contact constraints can be solved locally using linear complementarity techniques. However, these techniques do not impose the original constraints and...
Michael B. Cline, Dinesh K. Pai
IEEEPACT
2006
IEEE
14 years 1 months ago
Whole-program optimization of global variable layout
On machines with high-performance processors, the memory system continues to be a performance bottleneck. Compilers insert prefetch operations and reorder data accesses to improve...
Nathaniel McIntosh, Sandya Mannarswamy, Robert Hun...
SASP
2009
IEEE
222views Hardware» more  SASP 2009»
14 years 2 months ago
A memory optimization technique for software-managed scratchpad memory in GPUs
—With the appearance of massively parallel and inexpensive platforms such as the G80 generation of NVIDIA GPUs, more real-life applications will be designed or ported to these pl...
Maryam Moazeni, Alex A. T. Bui, Majid Sarrafzadeh