Sciweavers

1635 search results - page 310 / 327
» Cross-layer memory management for managed language applicati...
Sort
View
ICS
2003
Tsinghua U.
15 years 4 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
SAC
2009
ACM
15 years 3 months ago
Fast networking with socket-outsourcing in hosted virtual machine environments
This paper proposes a novel method of achieving fast networking in hosted virtual machine (VM) environments. This method, called socket-outsourcing, replaces the socket layer in a...
Hideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyu...
73
Voted
ISCA
2000
IEEE
107views Hardware» more  ISCA 2000»
15 years 3 months ago
A fully associative software-managed cache design
As DRAM access latencies approach a thousand instructionexecution times and on-chip caches grow to multiple megabytes, it is not clear that conventional cache structures continue ...
Erik G. Hallnor, Steven K. Reinhardt
CHINZ
2007
ACM
15 years 2 months ago
Evaluation of spatial abilities through tabletop AR
Research has been done into improving the means by which we organise and manage information. The usefulness of 2D versus 3D interfaces and environments has also been debated and e...
Moffat Mathews, Madan Challa, Cheng-Tse Chu, Gu Ji...
123
Voted
SOUPS
2010
ACM
15 years 2 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan