Sciweavers

439 search results - page 87 / 88
» Stretching transactional memory
Sort
View
SOUPS
2005
ACM
13 years 11 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
CASES
2004
ACM
13 years 11 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
ISCA
2000
IEEE
103views Hardware» more  ISCA 2000»
13 years 10 months ago
Piranha: a scalable architecture based on single-chip multiprocessing
The microprocessor industry is currently struggling with higher development costs and longer design times that arise from exceedingly complex processors that are pushing the limit...
Luiz André Barroso, Kourosh Gharachorloo, R...
IDEAS
1999
IEEE
144views Database» more  IDEAS 1999»
13 years 10 months ago
The Scalability of an Object Descriptor Architecture OODBMS
An object database management system (OODBMS) has been often criticized for its alleged insufficient scalability for a large-scale production system. We investigated the scalabili...
Kwok K. Yu, Byung Suk Lee, Michael R. Olson
SPAA
1997
ACM
13 years 10 months ago
A Localized Algorithm for Parallel Association Mining
Discovery of association rules is an important database mining problem. Mining for association rules involves extracting patterns from large databases and inferring useful rules f...
Mohammed Javeed Zaki, Srinivasan Parthasarathy, We...