Sciweavers

9387 search results - page 1605 / 1878
» An Optimal Process Model for a Real Time Process
Sort
View
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 11 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
AINA
2008
IEEE
15 years 11 months ago
Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors
—This work tries to derive ideas for thread allocation in Chip Multiprocessor (CMP)-based network processors performing general applications by Continuous-Time Markov Chain model...
Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
IEEEPACT
2007
IEEE
15 years 11 months ago
Verification-Aware Microprocessor Design
The process of verifying a new microprocessor is a major problem for the computer industry. Currently, architects design processors to be fast, power-efficient, and reliable. Howe...
Anita Lungu, Daniel J. Sorin
ISCA
2007
IEEE
208views Hardware» more  ISCA 2007»
15 years 11 months ago
Core fusion: accommodating software diversity in chip multiprocessors
This paper presents core fusion, a reconfigurable chip multiprocessor (CMP) architecture where groups of fundamentally independent cores can dynamically morph into a larger CPU, ...
Engin Ipek, Meyrem Kirman, Nevin Kirman, Jos&eacut...
140
Voted
IRI
2007
IEEE
15 years 11 months ago
Software Defects Prediction using Operating Characteristic Curves
We present a software defect prediction model using operating characteristic curves. The main idea behind our proposed technique is to use geometric insight in helping construct a...
Torsten Bergander, Yan Luo, A. Ben Hamza
« Prev « First page 1605 / 1878 Last » Next »