Sciweavers

5190 search results - page 900 / 1038
» Multithreaded Parallel Computer Model with Performance Evalu...
Sort
View
134
Voted
HPCA
2006
IEEE
16 years 2 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
ASPLOS
1989
ACM
15 years 6 months ago
Architecture and Compiler Tradeoffs for a Long Instruction Word Microprocessor
A very long instruction word (VLIW) processorexploits parallelism by controlling multiple operations in a single instruction word. This paper describes the architecture and compil...
Robert Cohn, Thomas R. Gross, Monica S. Lam, P. S....
ISCA
2007
IEEE
196views Hardware» more  ISCA 2007»
15 years 8 months ago
Anton, a special-purpose machine for molecular dynamics simulation
The ability to perform long, accurate molecular dynamics (MD) simulations involving proteins and other biological macromolecules could in principle provide answers to some of the ...
David E. Shaw, Martin M. Deneroff, Ron O. Dror, Je...
MSWIM
2005
ACM
15 years 8 months ago
Sensor-assisted wi-fi indoor location system for adapting to environmental dynamics
Wi-Fi based indoor location systems have been shown to be both cost-effective and accurate, since they can attain meter-level positioning accuracy by using existing Wi-Fi infrastr...
Yi-Chao Chen, Ji-Rung Chiang, Hao-Hua Chu, Polly H...
NETCOOP
2007
Springer
15 years 8 months ago
Load Shared Sequential Routing in MPLS Networks: System and User Optimal Solutions
Recently Gerald Ash has shown through case studies that event dependent routing is attractive in large scale multi-service MPLS networks. In this paper, we consider the application...
Gilles Brunet, Fariba Heidari, Lorne Mason