Sciweavers

425 search results - page 49 / 85
» Virtual private caches
Sort
View
CASES
2006
ACM
14 years 2 months ago
Adaptive object code compression
Previous object code compression schemes have employed static and semiadaptive compression algorithms to reduce the size of instruction memory in embedded systems. The suggestion ...
John Gilbert, David M. Abrahamson
CCS
2001
ACM
14 years 1 months ago
Implications of Digital Rights Management for Online Music - A Business Perspective
This paper will examine and categorize potential business model scenarios for online music. The virtualization of music leads to market uncertainties. On the supply side, the offer...
Willms Buhse
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 9 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...

Publication
1298views
15 years 7 months ago
Quality of Service for Internet Traffic over ATM Service Categories
Connecting enterprise sites requires innovative architectures. Virtual private networks (VPNs) linking different organizational sites over the Internet are a popular solution. Inte...
Sonia Fahmy, Raj Jain, Sameh Rabie, Rohit Goyal, B...
MICRO
2003
IEEE
258views Hardware» more  MICRO 2003»
14 years 2 months ago
LLVA: A Low-level Virtual Instruction Set Architecture
A virtual instruction set architecture (V-ISA) implemented via a processor-specific software translation layer can provide great flexibility to processor designers. Recent examp...
Vikram S. Adve, Chris Lattner, Michael Brukman, An...