Sciweavers

635 search results - page 81 / 127
» Data Criticality in Network-On-Chip Design
Sort
View
81
Voted
USS
2008
15 years 2 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
CORR
2007
Springer
94views Education» more  CORR 2007»
15 years 15 days ago
Exploring the academic invisible web
Purpose: To provide a critical review of Bergman’s 2001 study on the Deep Web. In addition, we bring a new concept into the discussion, the Academic Invisible Web (AIW). We defi...
Dirk Lewandowski, Philipp Mayr
DAC
2009
ACM
16 years 1 months ago
WCET-aware register allocation based on graph coloring
Current compilers lack precise timing models guiding their built-in optimizations. Hence, compilers apply ad-hoc heuristics during optimization to improve code quality. One of the...
Heiko Falk
202
Voted
ASPLOS
2009
ACM
16 years 1 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
OSDI
2008
ACM
16 years 25 days ago
Improving MapReduce Performance in Heterogeneous Environments
MapReduce is emerging as an important programming model for large-scale data-parallel applications such as web indexing, data mining, and scientific simulation. Hadoop is an open-...
Matei Zaharia, Andy Konwinski, Anthony D. Joseph, ...