Sciweavers

623 search results - page 85 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
335
Voted
SIGCSE
2008
ACM
365views Education» more  SIGCSE 2008»
15 years 3 months ago
Computer science olympiad: exploring computer science through competition
Generating interest in specialized areas of Computer Science (CS) is one of the goals of the department of Computer and Information Science at Spelman College as with most departm...
Iretta B. C. Kearse, Charles Hardnett
108
Voted
SBACPAD
2005
IEEE
139views Hardware» more  SBACPAD 2005»
15 years 9 months ago
Chained In-Order/Out-of-Order DoubleCore Architecture
Complexity is one of the most important problems facing microarchitects. It is exacerbated by the application of optimizations, by scaling to higher issue widths and, in general, ...
Miquel Pericàs, Adrián Cristal, Rube...
134
Voted
PET
2004
Springer
15 years 9 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
129
Voted
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
15 years 3 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....
122
Voted
FPL
2005
Springer
131views Hardware» more  FPL 2005»
15 years 9 months ago
An Efficient Approach to Hide the Run-Time Reconfiguration from SW Applications
Dynamically reconfigurable logic is becoming an important design unit in SoC system. A method to make the reconfiguration management transparent to software applications is requir...
Yang Qu, Juha-Pekka Soininen, Jari Nurmi