Sciweavers

840 search results - page 107 / 168
» A low-complexity issue logic
Sort
View
EUROMICRO
1998
IEEE
15 years 4 months ago
The Latency Hiding Effectiveness of Decoupled Access/Execute Processors
Several studies have demonstrated that out-of-order execution processors may not be the most adequate organization for wide issue processors due to the increasing penalties that w...
Joan-Manuel Parcerisa, Antonio González
ISHPC
1999
Springer
15 years 4 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson
EUROPKI
2007
Springer
15 years 3 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...
ICES
2000
Springer
140views Hardware» more  ICES 2000»
15 years 3 months ago
Evolving Cellular Automata for Self-Testing Hardware
Testing is a key issue in the design and production of digital circuits: the adoption of BIST (Built-In Self-Test) techniques is increasingly popular, but requires efficient algori...
Fulvio Corno, Matteo Sonza Reorda, Giovanni Squill...
PPDP
2000
Springer
15 years 3 months ago
Enhanced sharing analysis techniques: a comprehensive evaluation
an abstract domain developed by D. Jacobs and A. Langen for the analysis of logic programs, derives useful aliasing information. It is well-known that a commonly used core of tech...
Roberto Bagnara, Enea Zaffanella, Patricia M. Hill