Sciweavers

19 search results - page 2 / 4
» Survivability of Embryonic Memories: Analysis and Design Pri...
Sort
View
IJDE
2006
95views more  IJDE 2006»
15 years 1 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
MSE
2002
IEEE
135views Hardware» more  MSE 2002»
15 years 6 months ago
The Impact of SMT/SMP Designs on Multimedia Software Engineering - A Workload Analysis Study
This paper presents the study of running several core multimedia applications on a simultaneous multithreading (SMT) architecture and derives design principles for multimedia soft...
Yen-Kuang Chen, Rainer Lienhart, Eric Debes, Matth...
ISCAS
2003
IEEE
172views Hardware» more  ISCAS 2003»
15 years 7 months ago
Performance modeling of resonant tunneling based RAMs
Tunneling based random-access memories (TRAM’s) have recently garnered a great amount of interests among the memory designers due to their intrinsic merits such as reduced power...
Hui Zhang, Pinaki Mazumder, Li Ding 0002, Kyoungho...
IISWC
2009
IEEE
15 years 8 months ago
On the (dis)similarity of transactional memory workloads
— Programming to exploit the resources in a multicore system remains a major obstacle for both computer and software engineers. Transactional memory offers an attractive alternat...
Clay Hughes, James Poe, Amer Qouneh, Tao Li
VISSYM
2007
15 years 4 months ago
Multiscale Visualization of Dynamic Software Logs
We present a set of techniques and design principles for the visualization of large dynamic software logs consisting of attributed change events, such as obtained from instrumenti...
Sergio Moreta, Alexandru Telea