Sciweavers

784 search results - page 95 / 157
» What would they think
Sort
View
CSFW
2009
IEEE
14 years 2 months ago
Policy Compliance in Collaborative Systems
When collaborating agents share sensitive information to achieve a common goal it would be helpful to them to decide whether doing so will lead to an unwanted release of confiden...
Max I. Kanovich, Paul Rowe, Andre Scedrov
DATE
2009
IEEE
92views Hardware» more  DATE 2009»
14 years 2 months ago
Using randomization to cope with circuit uncertainty
—Future computing systems will feature many cores that run fast, but might show more faults compared to existing CMOS technologies. New software methodologies must be adopted to ...
Hamid Safizadeh, Mohammad Tahghighi, Ehsan K. Arde...
DATE
2009
IEEE
129views Hardware» more  DATE 2009»
14 years 2 months ago
Distributed peak power management for many-core architectures
Recently proposed techniques for peak power management [5] involve centralized decision-making and assume quick evaluation of the various power management states. These techniques...
John Sartori, Rakesh Kumar
SASP
2009
IEEE
156views Hardware» more  SASP 2009»
14 years 2 months ago
Introducing control-flow inclusion to support pipelining in custom instruction set extensions
—Multi-cycle Instruction set extensions (ISE) can be pipelined in order to increase their throughput; however, typical program traces seldom contain consecutive calls to the same...
Marcela Zuluaga, Theo Kluter, Philip Brisk, Nigel ...
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 2 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash