Sciweavers

19 search results - page 2 / 4
» Survivability of Embryonic Memories: Analysis and Design Pri...
Sort
View
IJDE
2006
95views more  IJDE 2006»
14 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
MSE
2002
IEEE
135views Hardware» more  MSE 2002»
15 years 2 months ago
The Impact of SMT/SMP Designs on Multimedia Software Engineering - A Workload Analysis Study
This paper presents the study of running several core multimedia applications on a simultaneous multithreading (SMT) architecture and derives design principles for multimedia soft...
Yen-Kuang Chen, Rainer Lienhart, Eric Debes, Matth...
88
Voted
ISCAS
2003
IEEE
172views Hardware» more  ISCAS 2003»
15 years 2 months ago
Performance modeling of resonant tunneling based RAMs
Tunneling based random-access memories (TRAM’s) have recently garnered a great amount of interests among the memory designers due to their intrinsic merits such as reduced power...
Hui Zhang, Pinaki Mazumder, Li Ding 0002, Kyoungho...
IISWC
2009
IEEE
15 years 4 months ago
On the (dis)similarity of transactional memory workloads
— Programming to exploit the resources in a multicore system remains a major obstacle for both computer and software engineers. Transactional memory offers an attractive alternat...
Clay Hughes, James Poe, Amer Qouneh, Tao Li
VISSYM
2007
14 years 12 months ago
Multiscale Visualization of Dynamic Software Logs
We present a set of techniques and design principles for the visualization of large dynamic software logs consisting of attributed change events, such as obtained from instrumenti...
Sergio Moreta, Alexandru Telea