Sciweavers

111 search results - page 5 / 23
» Work Stealing Technique and Scheduling on the Critical Path
Sort
View
DATE
2008
IEEE
111views Hardware» more  DATE 2008»
15 years 4 months ago
Incremental Criticality and Yield Gradients
— Criticality and yield gradients are two crucial diagnostic metrics obtained from Statistical Static Timing Analysis (SSTA). They provide valuable information to guide timing op...
Jinjun Xiong, Vladimir Zolotov, Chandu Visweswaria...
WSC
2007
15 years 4 days ago
Project planning using an interactive, structured modeling environment
Planning construction projects typically makes use of the activity network based Critical Path Method (CPM), since it is very simple to use and reasonably versatile. Most other pl...
Ian Flood
ICCCN
2008
IEEE
15 years 4 months ago
Work-Conserving Fair-Aggregation with Rate-Independent Delay
—Flow aggregation has been proposed as a technique to improve the scalability of QoS scheduling in the core of the Internet, by reducing the amount of per-flow state necessary a...
Jorge Arturo Cobb
DATE
2008
IEEE
107views Hardware» more  DATE 2008»
15 years 4 months ago
Instruction Set Extension Exploration in Multiple-Issue Architecture
To satisfy high-performance computing demand in modern embedded devices, current embedded processor architectures provide designer with possibility either to define customized ins...
I-Wei Wu, Zhi-Yuan Chen, Jean Jyh-Jiun Shann, Chun...
71
Voted
ACSAC
2008
IEEE
15 years 4 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...