Sciweavers

21437 search results - page 154 / 4288
» Hardware
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
16 years 1 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
ISPASS
2010
IEEE
15 years 11 months ago
Hardware prediction of OS run-length for fine-grained resource customization
—In the past ten years, computer architecture has seen a paradigm shift from emphasizing single thread performance to energy efficient, throughput oriented, chip multiprocessors...
David Nellans, Kshitij Sudan, Rajeev Balasubramoni...
TEI
2010
ACM
172views Hardware» more  TEI 2010»
15 years 11 months ago
FlexiKnobs: bridging the gap between mouse interaction and hardware controllers
Parameters in audio or video editing applications can mostly be controlled by a variety of hardware devices such as MIDI controllers. These, however, usually feature only a limite...
Kristian Gohlke, Michael Hlatky, Sebastian Heise, ...
SC
2009
ACM
15 years 11 months ago
Implementing a high-volume, low-latency market data processing system on commodity hardware using IBM middleware
A stock market data processing system that can handle high data volumes at low latencies is critical to market makers. Such systems play a critical role in algorithmic trading, ri...
Xiaolan J. Zhang, Henrique Andrade, Bugra Gedik, R...
ARC
2009
Springer
241views Hardware» more  ARC 2009»
15 years 11 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro