Sciweavers

13895 search results - page 2424 / 2779
» Exploring
Sort
View
ISCC
2008
IEEE
138views Communications» more  ISCC 2008»
15 years 11 months ago
ROHC and aggregated VoIP over fixed WiMAX: An empirical evaluation
WiMAX has been at the center of attention in wireless communications during the last years. Nonetheless, very few testbed or field trial measurement accounts have been reported i...
Esa Piri, Jarno Pinola, Frerk Fitzek, Kostas Penti...
ISPASS
2008
IEEE
15 years 11 months ago
Configurational Workload Characterization
Although the best processor design for executing a specific workload does depend on the characteristics of the workload, it can not be determined without factoring-in the effect o...
Hashem Hashemi Najaf-abadi, Eric Rotenberg
ISPASS
2008
IEEE
15 years 11 months ago
An Analysis of I/O And Syscalls In Critical Sections And Their Implications For Transactional Memory
Transactional memory (TM) is a scalable and concurrent way to build atomic sections. One aspect of TM that remains unclear is how side-effecting operations – that is, those whic...
Lee Baugh, Craig B. Zilles
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
15 years 11 months ago
Tradeoffs in designing accelerator architectures for visual computing
Visualization, interaction, and simulation (VIS) constitute a class of applications that is growing in importance. This class includes applications such as graphics rendering, vid...
Aqeel Mahesri, Daniel R. Johnson, Neal C. Crago, S...
NDSS
2008
IEEE
15 years 11 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
« Prev « First page 2424 / 2779 Last » Next »