Sciweavers

987 search results - page 59 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
ASPLOS
2008
ACM
15 years 3 months ago
Hardware counter driven on-the-fly request signatures
Today's processors provide a rich source of statistical information on application execution through hardware counters. In this paper, we explore the utilization of these sta...
Kai Shen, Ming Zhong, Sandhya Dwarkadas, Chuanpeng...
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
15 years 1 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 7 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
ISWC
2002
IEEE
15 years 6 months ago
Mediated Reality Using Computer Graphics Hardware for Computer Vision
Wearable, camera based, head–tracking systems use spatial image registration algorithms to align images taken as the wearer gazes around their environment. This allows for compu...
James Fung, Felix Tang, Steve Mann
117
Voted
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 7 months ago
Synthesis of analog filters on an evolvable hardware platform using a genetic algorithm
This work presents a novel approach to filter synthesis on a field programmable analog array (FPAA) architecture using a genetic algorithm (GA). First, a Matlab model of the FPA...
Joachim Becker, Stanis Trendelenburg, Fabian Henri...