Sciweavers

106 search results - page 3 / 22
» dac 2009
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
DAC
2009
ACM
13 years 11 months ago
GPU friendly fast Poisson solver for structured power grid network analysis
In this paper, we propose a novel simulation algorithm for large scale structured power grid networks. The new method formulates the traditional linear system as a special two-dim...
Jin Shi, Yici Cai, Wenting Hou, Liwei Ma, Sheldon ...
DAC
2009
ACM
14 years 9 months ago
Efficient program scheduling for heterogeneous multi-core processors
Heterogeneous multicore processors promise high execution efficiency under diverse workloads, and program scheduling is critical in exploiting this efficiency. This paper present...
Jian Chen, Lizy Kurian John
DAC
2009
ACM
14 years 1 months ago
Exploiting "architecture for verification" to streamline the verification process
A typical hardware development flow starts the verification process concurrently with RTL, but the overall schedule becomes limited by the effort required to complete all the nece...
Dave Whipp
DAC
2009
ACM
14 years 1 months ago
Serial reconfigurable mismatch-tolerant clock distribution
We present an unconventional clock distribution that emphasizes flexibility and layout independence. It suits a variety of applications, clock domain shapes and sizes using a modu...
Atanu Chattopadhyay, Zeljko Zilic