Sciweavers

10707 search results - page 114 / 2142
» Designing executable abstractions
Sort
View
MOBISYS
2003
ACM
16 years 2 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...
VIZSEC
2004
Springer
15 years 8 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
EUROPAR
2001
Springer
15 years 7 months ago
Execution Latency Reduction via Variable Latency Pipeline and Instruction Reuse
Operand bypass logic might be one of the critical structures for future microprocessors to achieve high clock speed. The delay of the logic imposes the execution time budget to be ...
Toshinori Sato, Itsujiro Arita
FMICS
2006
Springer
15 years 7 months ago
Test Coverage for Loose Timing Annotations
Abstract. The design flow of systems-on-a-chip (SoCs) identifies several abstraction levels higher than the Register-Transfer-Level that constitutes the input of the synthesis tool...
Claude Helmstetter, Florence Maraninchi, Laurent M...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 5 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...