Sciweavers

2169 search results - page 382 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
SIGACT
2010
68views more  SIGACT 2010»
13 years 3 months ago
A survey of buffer management policies for packet switches
Over the past decade, there has been great interest in the study of buffer management policies in the context of packet transmission for network switches. In a typical model, a sw...
Michael H. Goldwasser
TIM
2010
294views Education» more  TIM 2010»
13 years 3 months ago
Standby Leakage Power Reduction Technique for Nanoscale CMOS VLSI Systems
In this paper, a novel low-power design technique is proposed to minimize the standby leakage power in nanoscale CMOS very large scale integration (VLSI) systems by generating the ...
HeungJun Jeon, Yong-Bin Kim, Minsu Choi
FAST
2011
13 years 8 days ago
Capo: Recapitulating Storage for Virtual Desktops
Shared storage underlies most enterprise VM deployments because it is an established technology that administrators are familiar with and because it good job of protecting data. H...
Mohammad Shamma, Dutch T. Meyer, Jake Wires, Maria...
SIGCOMM
2009
ACM
14 years 3 months ago
VL2: a scalable and flexible data center network
To be agile and cost effective, data centers should allow dynamic resource allocation across large server pools. In particular, the data center network should enable any server to...
Albert G. Greenberg, James R. Hamilton, Navendu Ja...
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 2 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...