Sciweavers

20175 search results - page 3946 / 4035
» Is abstraction the key to computing
Sort
View
132
Voted
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 7 months ago
Rule-based multi-query optimization
Data stream management systems usually have to process many long-running queries that are active at the same time. Multiple queries can be evaluated more efficiently together tha...
Mingsheng Hong, Mirek Riedewald, Christoph Koch, J...
123
Voted
HIPEAC
2009
Springer
15 years 7 months ago
Collective Optimization
Abstract. Iterative compilation is an efficient approach to optimize programs on rapidly evolving hardware, but it is still only scarcely used in practice due to a necessity to gat...
Grigori Fursin, Olivier Temam
103
Voted
DATE
2009
IEEE
114views Hardware» more  DATE 2009»
15 years 7 months ago
Hardware aging-based software metering
Abstract—Reliable and verifiable hardware, software and content usage metering (HSCM) are of primary importance for wide segments of e-commerce including intellectual property a...
Foad Dabiri, Miodrag Potkonjak
108
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Peer-to-Peer Single Hop Distributed Hash Tables
Abstract—Efficiently locating information in large-scale distributed systems is a challenging problem to which Peer-to-Peer (P2P) Distributed Hash Tables (DHTs) can provide a hi...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
100
Voted
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
15 years 7 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...
« Prev « First page 3946 / 4035 Last » Next »