Sciweavers

3922 search results - page 57 / 785
» The IA-64 Architecture at Work
Sort
View
COMSUR
2011
213views Hardware» more  COMSUR 2011»
13 years 11 months ago
Securing BGP - A Literature Survey
Abstract—The Border Gateway Protocol (BGP) is the Internet’s inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures,...
Geoff Huston, Mattia Rossi, Grenville J. Armitage
HIPEAC
2011
Springer
13 years 11 months ago
A workload-aware mapping approach for data-parallel programs
Much compiler-orientated work in the area of mapping parallel programs to parallel architectures has ignored the issue of external workload. Given that the majority of platforms w...
Dominik Grewe, Zheng Wang, Michael F. P. O'Boyle
VLSID
2006
IEEE
160views VLSI» more  VLSID 2006»
16 years 6 days ago
An Approach to Architectural Enhancement for Embedded Speech Applications
Advances in Human Computer Interaction(HCI) technology has resulted in widespread development of natural language and speech applications. These applications are known to be compu...
Soumyajit Dey, Susmit Biswas, Arijit Mukhopadhyay,...
ICSE
2004
IEEE-ACM
15 years 12 months ago
Component-Based Self-Adaptability in Peer-to-Peer Architectures
Current peer-to-peer architectures are hardly resistant against unanticipated exceptions such as the failure of single peers. This can be justified by the absence of sophisticated...
Sascha Alda
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
15 years 6 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman