Sciweavers

623 search results - page 107 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
129
Voted
ISCA
2007
IEEE
103views Hardware» more  ISCA 2007»
15 years 9 months ago
Ginger: control independence using tag rewriting
The negative performance impact of branch mis-predictions can be reduced by exploiting control independence (CI). When a branch mis-predicts, the wrong-path instructions up to the...
Andrew D. Hilton, Amir Roth
ISPD
2006
ACM
90views Hardware» more  ISPD 2006»
15 years 9 months ago
Fast buffer insertion considering process variations
Advanced process technologies call for a proactive consideration of process variations in design to ensure high parametric timing yield. Despite of its popular use in almost any h...
Jinjun Xiong, Lei He
133
Voted
MSWIM
2005
ACM
15 years 9 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
206
Voted
IHI
2012
353views Healthcare» more  IHI 2012»
13 years 11 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
166
Voted
FCCM
2008
IEEE
212views VLSI» more  FCCM 2008»
15 years 10 months ago
Map-reduce as a Programming Model for Custom Computing Machines
The map-reduce model requires users to express their problem in terms of a map function that processes single records in a stream, and a reduce function that merges all mapped out...
Jackson H. C. Yeung, C. C. Tsang, Kuen Hung Tsoi, ...