Sciweavers

242 search results - page 43 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
IRI
2007
IEEE
15 years 3 months ago
An Object-Oriented Approach for High Availability of Applications Integration
The integration of networked applications, especially those requiring continuous access to shared information resources and databases, may be effected by scheduled unavailability ...
Jameela Al-Jaroodi, Nader Mohamed
LATIN
2004
Springer
15 years 2 months ago
A Proof System and a Decision Procedure for Equality Logic
Equality logic with or without uninterpreted functions is used for proving the equivalence or refinement between systems (hardware verification, compiler’s translation, etc). C...
Olga Tveretina, Hans Zantema
ACISICIS
2005
IEEE
15 years 3 months ago
An Effective Cache Overlapping Storage Structure for SMT Processors
Simultaneous Multithreaded (SMT) processors improve the instruction throughput by allowing fetching and running instructions from several threads simultaneously at a single cycle....
Liqiang He, Zhiyong Liu
CASES
2004
ACM
15 years 1 months ago
Reducing energy consumption of queries in memory-resident database systems
The tremendous growth of system memories has increased the capacities and capabilities of memory-resident embedded databases, yet current embedded databases need to be tuned in or...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
CASES
2008
ACM
14 years 11 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar