Sciweavers

987 search results - page 66 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
CCS
2009
ACM
16 years 2 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 7 months ago
A hardware pipeline for function optimization using genetic algorithms
Genetic Algorithms (GAs) are very commonly used as function optimizers, basically due to their search capability. A number of different serial and parallel versions of GA exist. ...
Malay Kumar Pakhira, Rajat K. De
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
15 years 6 months ago
An error-correcting unordered code and hardware support for robust asynchronous global communication
A new delay-insensitive data encoding scheme for global asynchronous communication is introduced. The goal of this work is to combine the timing-robustness of delay-insensitive (i....
Melinda Y. Agyekum, Steven M. Nowick
DEBS
2010
ACM
15 years 5 months ago
Evaluation of streaming aggregation on parallel hardware architectures
We present a case study parallelizing streaming aggregation on three different parallel hardware architectures. Aggregation is a performance-critical operation for data summarizat...
Scott Schneider, Henrique Andrade, Bugra Gedik, Ku...
ISCAS
2005
IEEE
145views Hardware» more  ISCAS 2005»
15 years 7 months ago
SoC platform based design of MPEG-2/4 AAC audio decoder
—This paper presents a SoC platform based design for the implementation of AAC audio decoder. We present the approach not only for the characteristics of the algorithm, but also ...
Chun-Nan Liu, Tsung-Han Tsai