Sciweavers

1541 search results - page 95 / 309
» Software Hardware Co-Scheduling for Reconfigurable Computing...
Sort
View
ASPLOS
2008
ACM
14 years 11 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
ACSAC
2004
IEEE
15 years 1 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ICVS
2003
Springer
15 years 3 months ago
Monkeys -- A Software Architecture for ViRoom -- Low-Cost Multicamera System
Abstract. This paper presents a software architecture for a softwaresynchronized multicamera setup. The software allows consistent multiimage acquisition, image processing and deci...
Petr Doubek, Tomás Svoboda, Luc J. Van Gool
DAC
2008
ACM
14 years 11 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
IEEEARES
2010
IEEE
15 years 4 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy