Sciweavers

1855 search results - page 227 / 371
» System Consequence
Sort
View
CCS
2011
ACM
14 years 5 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
168
Voted
SIGMETRICS
2005
ACM
105views Hardware» more  SIGMETRICS 2005»
15 years 10 months ago
An interposed 2-Level I/O scheduling framework for performance virtualization
I/O consolidation is a growing trend in production environments due to the increasing complexity in tuning and managing storage systems. A consequence of this trend is the need to...
Jianyong Zhang, Anand Sivasubramaniam, Alma Riska,...
ICAT
2006
IEEE
15 years 11 months ago
Projected Reality - Content Delivery Right onto Objects of Daily Life
—Spatial augmented reality using controllable projector-camera-systems to project onto objects directly, or Projected Reality as we call it, offers the possibility to augment obj...
Jochen Ehnes, Michitaka Hirose
ICSE
2009
IEEE-ACM
15 years 9 months ago
A-SCORE: Automatic software component recommendation using coding context
Reusing software components (e.g. classes or modules) improves software quality and developer’s productivity. Unfortunately, developers may miss many reusing opportunities since...
Ryuji Shimada, Yasuhiro Hayase, Makoto Ichii, Mako...
CASES
2006
ACM
15 years 11 months ago
Mitigating soft error failures for multimedia applications by selective data protection
With advances in process technology, soft errors (SE) are becoming an increasingly critical design concern. Due to their large area and high density, caches are worst hit by soft ...
Kyoungwoo Lee, Aviral Shrivastava, Ilya Issenin, N...