Sciweavers

2746 search results - page 312 / 550
» Application performance on the Direct Access File System
Sort
View
CCS
2010
ACM
15 years 4 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
ICCS
2005
Springer
15 years 10 months ago
Collecting and Exploiting Cache-Reuse Metrics
Abstract. The increasing gap of processor and main memory performance underlines the need for cache-optimizations, especially on memoryintensive applications. Tools which are able ...
Josef Weidendorfer, Carsten Trinitis
FPL
2009
Springer
145views Hardware» more  FPL 2009»
15 years 9 months ago
Run-time Partial Reconfiguration speed investigation and architectural design space exploration
Run-time Partial Reconfiguration (PR) speed is significant in applications especially when fast IP core switching is required. In this paper, we propose to use Direct Memory Acce...
Ming Liu, Wolfgang Kuehn, Zhonghai Lu, Axel Jantsc...
BMCBI
2010
125views more  BMCBI 2010»
14 years 11 months ago
ProbFAST: Probabilistic Functional Analysis System Tool
Background: The post-genomic era has brought new challenges regarding the understanding of the organization and function of the human genome. Many of these challenges are centered...
Israel T. da Silva, Ricardo Z. N. Vêncio, Th...
ACSD
2003
IEEE
103views Hardware» more  ACSD 2003»
15 years 10 months ago
Design Validation of ZCSP with SPIN
— We consider the problem of specifying a model of the Zero Copy Secured Protocol for the purpose of LTL verification with the SPIN Model Checker. ZCSP is based on Direct Memory...
Vincent Beaudenon, Emmanuelle Encrenaz, Jean Lou D...