Sciweavers

5457 search results - page 1031 / 1092
» Software Component Independence
Sort
View
117
Voted
CCS
2008
ACM
15 years 2 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
103
Voted
CODES
2008
IEEE
15 years 2 months ago
ODOR: a microresonator-based high-performance low-cost router for optical networks-on-Chip
The performance of system-on-chip is determined not only by the performance of its functional units, but also by how efficiently they cooperate with one another. It is the on-chip...
Huaxi Gu, Jiang Xu, Zheng Wang
161
Voted
CODES
2008
IEEE
15 years 2 months ago
Application specific non-volatile primary memory for embedded systems
Memory subsystems have been considered as one of the most critical components in embedded systems and furthermore, displaying increasing complexity as application requirements div...
Kwangyoon Lee, Alex Orailoglu
AVI
2010
15 years 2 months ago
Wakame: sense making of multi-dimensional spatial-temporal data
As our ability to measure the world around us improves, we are quickly generating massive quantities of high-dimensional, spatial-temporal data. In this paper, we concern ourselve...
Clifton Forlines, Kent Wittenburg
193
Voted
CIDR
2007
208views Algorithms» more  CIDR 2007»
15 years 2 months ago
Impliance: A Next Generation Information Management Appliance
Though database technology has been remarkably successful in building a large market and adapting to the changes of the last three decades, its impact on the broader market of inf...
Bishwaranjan Bhattacharjee, Joseph S. Glider, Rich...
« Prev « First page 1031 / 1092 Last » Next »