Sciweavers

7921 search results - page 1464 / 1585
» LSH-preserving functions and their applications
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
IROS
2008
IEEE
250views Robotics» more  IROS 2008»
15 years 4 months ago
Mobile robot broadband sound localisation using a biologically inspired spiking neural network
— A biologically inspired azimuthal broadband sound localisation system is introduced to simulates the functional organisation of the human auditory midbrain up to the inferior c...
Jindong Liu, Harry R. Erwin, Stefan Wermter
ISPASS
2008
IEEE
15 years 4 months ago
Pinpointing and Exploiting Opportunities for Enhancing Data Reuse
—The potential for improving the performance of data-intensive scientific programs by enhancing data reuse in cache is substantial because CPUs are significantly faster than me...
Gabriel Marin, John M. Mellor-Crummey
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 4 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
DATE
2007
IEEE
173views Hardware» more  DATE 2007»
15 years 4 months ago
Architectural leakage-aware management of partitioned scratchpad memories
Partitioning a memory into multiple blocks that can be independently accessed is a widely used technique to reduce its dynamic power. For embedded systems, its benefits can be ev...
Olga Golubeva, Mirko Loghi, Massimo Poncino, Enric...
« Prev « First page 1464 / 1585 Last » Next »