Sciweavers

1555 search results - page 310 / 311
» Using Macromodels to Manage Collections of Related Models
Sort
View
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
IPPS
2006
IEEE
14 years 1 months ago
A simulation study of the effects of multi-path approaches in e-commerce applications
Response time is a key factor of any e-Commerce application, and a set of solutions have been proposed to provide low response time despite network congestions or failures. Being ...
Paolo Romano, Francesco Quaglia, Bruno Ciciani
ISCA
2006
IEEE
137views Hardware» more  ISCA 2006»
14 years 1 months ago
Multiple Instruction Stream Processor
Microprocessor design is undergoing a major paradigm shift towards multi-core designs, in anticipation that future performance gains will come from exploiting threadlevel parallel...
Richard A. Hankins, Gautham N. Chinya, Jamison D. ...
IWCMC
2006
ACM
14 years 1 months ago
Proposal for a cross-layer coordination framework for next generation wireless systems
Cross-Layer design has been the focus of several recent research efforts. Due to the highly variable nature of the links used in wireless communication systems and the resource-po...
Karim M. El Defrawy, Magda El Zarki, Mohamed M. Kh...
ISCA
2000
IEEE
107views Hardware» more  ISCA 2000»
14 years 5 days ago
A fully associative software-managed cache design
As DRAM access latencies approach a thousand instructionexecution times and on-chip caches grow to multiple megabytes, it is not clear that conventional cache structures continue ...
Erik G. Hallnor, Steven K. Reinhardt