Sciweavers

154 search results - page 17 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
ICIP
2008
IEEE
15 years 8 months ago
Macroblock-based retransmission for error-resilient video streaming
This paper revisits the problem of source-channel coding for error-resilient video streaming. We propose a new method to enable adaptive redundancy in the bitstream: fine-grain r...
J. Christian Schmidt, Kenneth Rose
SIGOPSE
2004
ACM
15 years 7 months ago
When physical is not real enough
This position paper argues that policies for physical memory management and for memory power mode control should be relocated to the system software of a programmable memory manag...
Frank Bellosa
GLOBECOM
2009
IEEE
15 years 8 months ago
LA-MAC: A Load Adaptive MAC Protocol for MANETs
—The performance of prevalent MAC protocols in MANETs relies on the level of contention in networks. While contention-based MAC protocols such as CSMA suffer from inefficiency u...
Weihong Hu, Xiaolong Li, Homayoun Yousefi'zadeh
CASES
2007
ACM
15 years 6 months ago
Cache leakage control mechanism for hard real-time systems
Leakage energy consumption is an increasingly important issue as the technology continues to shrink. Since on-chip caches constitute a major portion of the processor's transi...
Jaw-Wei Chi, Chia-Lin Yang, Yi-Jung Chen, Jian-Jia...
EUROSYS
2010
ACM
15 years 11 months ago
Kivati: Fast Detection and Prevention of Atomicity Violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violat...
Lee Chew, David Lie