Sciweavers

8503 search results - page 1408 / 1701
» Secure Software Architectures
Sort
View
101
Voted
VLSID
2002
IEEE
172views VLSI» more  VLSID 2002»
16 years 1 months ago
Improvement of ASIC Design Processes
With device counts on modern-day ASICs crossing the 10 million mark, careful planning of an ASIC design project is necessary to meet time deadlines. Two problems arise in this con...
Vineet Sahula, C. P. Ravikumar, D. Nagchoudhuri
154
Voted
HPCA
2006
IEEE
16 years 1 months ago
An approach for implementing efficient superscalar CISC processors
An integrated, hardware / software co-designed CISC processor is proposed and analyzed. The objectives are high performance and reduced complexity. Although the x86 ISA is targete...
Shiliang Hu, Ilhyun Kim, Mikko H. Lipasti, James E...
103
Voted
HPCA
2006
IEEE
16 years 1 months ago
The common case transactional behavior of multithreaded programs
Transactional memory (TM) provides an easy-to-use and high-performance parallel programming model for the upcoming chip-multiprocessor systems. Several researchers have proposed a...
JaeWoong Chung, Hassan Chafi, Chi Cao Minh, Austen...
CHI
2003
ACM
16 years 1 months ago
iStuff: a physical user interface toolkit for ubiquitous computing environments
The iStuff toolkit of physical devices, and the flexible software infrastructure to support it, were designed to simplify the exploration of novel interaction techniques in the po...
Rafael Ballagas, Meredith Ringel, Maureen C. Stone...
96
Voted
ICSE
2004
IEEE-ACM
16 years 25 days ago
An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition
Building a configuration management (CM) system is a difficult endeavor that regularly requires tens of thousands of lines of code to be written. To reduce this effort, several ex...
Ronald van der Lingen, André van der Hoek
« Prev « First page 1408 / 1701 Last » Next »