Sciweavers

94 search results - page 7 / 19
» Automated Analysis of Memory Access Behavior
Sort
View
NDSS
2009
IEEE
15 years 4 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
EUROPAR
2005
Springer
15 years 3 months ago
Event-Based Measurement and Analysis of One-Sided Communication
Abstract. To analyze the correctness and the performance of a program, information about the dynamic behavior of all participating processes is needed. The dynamic behavior can be ...
Marc-André Hermanns, Bernd Mohr, Felix Wolf
ISCA
1997
IEEE
135views Hardware» more  ISCA 1997»
15 years 1 months ago
The Design and Analysis of a Cache Architecture for Texture Mapping
The effectiveness of texture mapping in enhancing the realism of computer generated imagery has made support for real-time texture mapping a critical part of graphics pipelines. D...
Ziyad S. Hakura, Anoop Gupta
ISVLSI
2007
IEEE
204views VLSI» more  ISVLSI 2007»
15 years 3 months ago
Designing Memory Subsystems Resilient to Process Variations
As technology scales, more sophisticated fabrication processes cause variations in many different parameters in the device. These variations could severely affect the performance ...
Mahmoud Ben Naser, Yao Guo, Csaba Andras Moritz
LCPC
2001
Springer
15 years 2 months ago
Bridging the Gap between Compilation and Synthesis in the DEFACTO System
Abstract. The DEFACTO project - a Design Environment For Adaptive Computing TechnOlogy - is a system that maps computations, expressed in high-level languages such as C, directly o...
Pedro C. Diniz, Mary W. Hall, Joonseok Park, Byoun...