Sciweavers

4330 search results - page 785 / 866
» Analyzing security architectures
Sort
View
84
Voted
WCET
2010
14 years 8 months ago
WCET Analysis of a Parallel 3D Multigrid Solver Executed on the MERASA Multi-Core
To meet performance requirements as well as constraints on cost and power consumption, future embedded systems will be designed with multi-core processors. However, the question o...
Christine Rochange, Armelle Bonenfant, Pascal Sain...
168
Voted
HIPC
2009
Springer
14 years 8 months ago
A performance prediction model for the CUDA GPGPU platform
The significant growth in computational power of modern Graphics Processing Units(GPUs) coupled with the advent of general purpose programming environments like NVIDA's CUDA,...
Kishore Kothapalli, Rishabh Mukherjee, M. Suhail R...
ICCAD
2009
IEEE
119views Hardware» more  ICCAD 2009»
14 years 8 months ago
Iterative layering: Optimizing arithmetic circuits by structuring the information flow
Current logic synthesis techniques are ineffective for arithmetic circuits. They perform poorly for XOR-dominated circuits, and those with a high fan-in dependency between inputs ...
Ajay K. Verma, Philip Brisk, Paolo Ienne
79
Voted
IFIPTM
2009
163views Management» more  IFIPTM 2009»
14 years 8 months ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano
74
Voted
HOTNETS
2010
14 years 5 months ago
DevoFlow: cost-effective flow management for high performance enterprise networks
The OpenFlow framework enables flow-level control over Ethernet switching, as well as centralized visibility of the flows in the network. OpenFlow's coupling of these feature...
Jeffrey C. Mogul, Jean Tourrilhes, Praveen Yalagan...