Sciweavers

1428 search results - page 150 / 286
» aims 2010
Sort
View
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 9 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
140
Voted
CLOUD
2010
ACM
15 years 9 months ago
Lithium: virtual machine storage for the cloud
To address the limitations of centralized shared storage for cloud computing, we are building Lithium, a distributed storage system designed specifically for virtualization workl...
Jacob Gorm Hansen, Eric Jul
118
Voted
IWCMC
2010
ACM
15 years 9 months ago
An oversampling approach for LoS-ToA estimation in interleaved OFDMA
Line-of-sight (LoS) time-of-arrival (ToA) is one of key parameters for network-based localization techniques. Its estimation accuracy depends on the bandwidth of transmitted signa...
Ziming He, Yi Ma, Rahim Tafazolli, Hongju Liu
PLDI
2010
ACM
15 years 9 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
121
Voted
UM
2010
Springer
15 years 9 months ago
Analyzing Community Knowledge Sharing Behavior
The effectiveness of support provided to virtual communities depends strongly on what we know about a particular community of people and in what areas the community needs support....
Styliani Kleanthous, Vania Dimitrova