Sciweavers

1657 search results - page 285 / 332
» Subjective Mapping
Sort
View
123
Voted
CCS
2009
ACM
15 years 10 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
111
Voted
CCS
2009
ACM
15 years 10 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt
131
Voted
FPGA
2009
ACM
159views FPGA» more  FPGA 2009»
15 years 10 months ago
Choose-your-own-adventure routing: lightweight load-time defect avoidance
Aggressive scaling increases the number of devices we can integrate per square millimeter but makes it increasingly difficult to guarantee that each device fabricated has the inte...
Raphael Rubin, André DeHon
115
Voted
ICS
2009
Tsinghua U.
15 years 10 months ago
Zero-content augmented caches
It has been observed that some applications manipulate large amounts of null data. Moreover these zero data often exhibit high spatial locality. On some applications more than 20%...
Julien Dusser, Thomas Piquet, André Seznec
143
Voted
ICS
2009
Tsinghua U.
15 years 10 months ago
High-performance CUDA kernel execution on FPGAs
In this work, we propose a new FPGA design flow that combines the CUDA programming model from Nvidia with the state of the art high-level synthesis tool AutoPilot from AutoESL, to...
Alexandros Papakonstantinou, Karthik Gururaj, John...