Sciweavers

43190 search results - page 8502 / 8638
» Can Development Be Designed
Sort
View
ICS
2003
Tsinghua U.
15 years 10 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CGO
2010
IEEE
15 years 10 months ago
Taming hardware event samples for FDO compilation
Feedback-directed optimization (FDO) is effective in improving application runtime performance, but has not been widely adopted due to the tedious dual-compilation model, the dif...
Dehao Chen, Neil Vachharajani, Robert Hundt, Shih-...
EDBT
2010
ACM
189views Database» more  EDBT 2010»
15 years 10 months ago
Efficient physical operators for cost-based XPath execution
The creation of a generic and modular query optimization and processing infrastructure can provide significant benefits to XML data management. Key pieces of such an infrastructur...
Haris Georgiadis, Minas Charalambides, Vasilis Vas...
ISBMS
2010
Springer
15 years 10 months ago
A Theoretical Model for RF Ablation of Kidney Tissue and Its Experimental Validation
Radio-frequency (RF) ablation is a minimal invasive thermal therapy, currently considered as an alternative to surgery to eradicate small solid kidney tumors. Our aim is to underst...
Mihaela Pop, Sean R. H. Davidson, Mark Gertner, Mi...
CLOUD
2010
ACM
15 years 10 months ago
Virtual machine power metering and provisioning
Virtualization is often used in cloud computing platforms for its several advantages in efficiently managing resources. However, virtualization raises certain additional challeng...
Aman Kansal, Feng Zhao, Jie Liu, Nupur Kothari, Ar...
« Prev « First page 8502 / 8638 Last » Next »