Sciweavers

4463 search results - page 742 / 893
» computing 2000
Sort
View
136
Voted
APCSAC
2007
IEEE
15 years 7 months ago
Unbiased Branches: An Open Problem
The majority of currently available dynamic branch predictors base their prediction accuracy on the previous k branch outcomes. Such predictors sustain high prediction accuracy but...
Arpad Gellert, Adrian Florea, Maria Vintan, Colin ...
147
Voted
IEEEPACT
2007
IEEE
15 years 7 months ago
Component-Based Lock Allocation
The allocation of lock objects to critical sections in concurrent programs affects both performance and correctness. Recent work explores automatic lock allocation, aiming primari...
Richard L. Halpert, Christopher J. F. Pickett, Cla...
88
Voted
BTW
2007
Springer
105views Database» more  BTW 2007»
15 years 7 months ago
When the Internet Hits the Road
: The Internet has recovered from the dot-com crash of the early 2000’s and now features an abundance of new, innovative technologies and services. We are also witnessing the eme...
Christian S. Jensen
89
Voted
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
15 years 6 months ago
A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead
This paper proposes a content-aware authentication scheme optimized to account for distortion and overhead for media streaming. When authenticated media is streamed over a lossy n...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....
104
Voted
ISCA
2006
IEEE
123views Hardware» more  ISCA 2006»
15 years 6 months ago
Improving Cost, Performance, and Security of Memory Encryption and Authentication
Protection from hardware attacks such as snoopers and mod chips has been receiving increasing attention in computer architecture. This paper presents a new combined memory encrypt...
Chenyu Yan, Daniel Englender, Milos Prvulovic, Bri...