Sciweavers

299 search results - page 59 / 60
» Structured semidefinite programs for the control of symmetri...
Sort
View
ASPLOS
2006
ACM
13 years 8 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
IPSN
2007
Springer
14 years 8 days ago
Exact distributed Voronoi cell computation in sensor networks
Distributed computation of Voronoi cells in sensor networks, i.e. computing the locus of points in a sensor field closest to a given sensor, is a key building block that supports...
Boulat A. Bash, Peter Desnoyers
BMCBI
2010
161views more  BMCBI 2010»
13 years 6 months ago
GeneMesh: a web-based microarray analysis tool for relating differentially expressed genes to MeSH terms
Background: An important objective of DNA microarray-based gene expression experimentation is determining interrelationships that exist between differentially expressed genes and ...
Saurin D. Jani, Gary L. Argraves, Jeremy L. Barth,...
CODES
2003
IEEE
13 years 11 months ago
Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and crypt
This paper describes a hardware-software co-design approach for flexible programmable Galois Field Processing for applications which require operations over GF(2m ), such as RS an...
Wei Ming Lim, Mohammed Benaissa
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
13 years 11 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee