Sciweavers

3651 search results - page 587 / 731
» Data Mining for Security Applications
Sort
View
120
Voted
IPPS
2010
IEEE
14 years 11 months ago
MMT: Exploiting fine-grained parallelism in dynamic memory management
Dynamic memory management is one of the most expensive but ubiquitous operations in many C/C++ applications. Additional features such as security checks, while desirable, further w...
Devesh Tiwari, Sanghoon Lee, James Tuck, Yan Solih...
92
Voted
SAFECOMP
2007
Springer
15 years 7 months ago
Software Encoded Processing: Building Dependable Systems with Commodity Hardware
In future, the decreasing feature size and the reduced power supply will make it much more difficult to built reliable microprocessors. Economic pressure will most likely result in...
Ute Wappler, Christof Fetzer
134
Voted
NPC
2005
Springer
15 years 6 months ago
Globus Toolkit Version 4: Software for Service-Oriented Systems
The Globus Toolkit (GT) has been developed since the late 1990s to support the development of service-oriented distributed computing applications and infrastructures. Core GT compo...
Ian T. Foster
CARDIS
1998
Springer
109views Hardware» more  CARDIS 1998»
15 years 5 months ago
The Vault, an Architecture for Smartcards to Gain Infinite Memory
Smartcard chips vendors have always done their best to embed more memory inside cards. These efforts are driven to allow their customers smartcard manufacturers - to mask more soft...
Patrick Biget
IPPS
2006
IEEE
15 years 7 months ago
Exploiting processing locality through paging configurations in multitasked reconfigurable systems
FPGA chips in reconfigurable computer systems are used as malleable coprocessors where components of a hardware library of functions can be configured as needed. As the number of ...
T. Taher, Tarek A. El-Ghazawi