Sciweavers

4166 search results - page 742 / 834
» A modular module system
Sort
View
125
Voted
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 10 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
138
Voted
ISSRE
2005
IEEE
15 years 10 months ago
A Novel Method for Early Software Quality Prediction Based on Support Vector Machine
The software development process imposes major impacts on the quality of software at every development stage; therefore, a common goal of each software development phase concerns ...
Fei Xing, Ping Guo, Michael R. Lyu
ITRE
2005
IEEE
15 years 10 months ago
MR-FQ: a fair scheduling algorithm for wireless networks with variable transmission rates
— Wireless networks are characterized by bursty and location-dependent errors. Although many fair scheduling methods have been proposed to address these issues, most of them assu...
You-Chiun Wang, Yu-Chee Tseng, Wen-Tsuen Chen, Kun...
MMSEC
2005
ACM
137views Multimedia» more  MMSEC 2005»
15 years 10 months ago
A fragile watermarking scheme for 3D meshes
In this paper, we propose a new fragile watermarking scheme for 3D meshes. Firstly, the watermark information is adaptively embedded into the mesh geometry by slightly adjusting t...
Hao-Tian Wu, Yiu-ming Cheung
151
Voted
SC
2005
ACM
15 years 10 months ago
Multilevel Parallelism in Computational Chemistry using Common Component Architecture and Global Arrays
The development of complex scientific applications for high-end systems is a challenging task. Addressing complexity of the involved software and algorithms is becoming increasing...
Manojkumar Krishnan, Yuri Alexeev, Theresa L. Wind...