Sciweavers

2756 search results - page 395 / 552
» Computation-Centric Memory Models
Sort
View
GLVLSI
2008
IEEE
137views VLSI» more  GLVLSI 2008»
15 years 10 months ago
Phase-based cache reconfiguration for a highly-configurable two-level cache hierarchy
Phase-based tuning methodologies specialize system parameters for each application phase of execution. Parameters are varied during execution, as opposed to remaining fixed as in ...
Ann Gordon-Ross, Jeremy Lau, Brad Calder
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
15 years 10 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
ICC
2008
IEEE
127views Communications» more  ICC 2008»
15 years 10 months ago
MIMO Optical Wireless Channels Using Halftoning
— Two-dimensional (2D) optical intensity channels exist in a variety of applications including holographic storage, page-oriented memories, optical interconnects, 2D barcodes, as...
Mohamed D. A. Mohamed, Awad Dabbo, Steve Hranilovi...
ICDCS
2008
IEEE
15 years 10 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
IISWC
2008
IEEE
15 years 10 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley