Search

Showing total 621 results

Search Constraints

Start Over You searched for: Topic computer Remove constraint Topic: computer Language undetermined Remove constraint Language: undetermined Journal ieee transactions on computers Remove constraint Journal: ieee transactions on computers
621 results

Search Results

1. Curvature and Creases: A Primer on Paper

2. MDev-NVMe: Mediated Pass-Through NVMe Virtualization Solution With Adaptive Polling

3. Reducing Flash Memory Write Traffic by Exploiting a Few MBs of Capacitor-Powered Write Buffer Inside Solid-State Drives (SSDs)

4. Guest Editors' Introduction to the Special Issue on Hardware Security

5. CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding

6. Optimizing Locality-Aware Memory Management of Key-Value Caches

7. Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems

8. Guest Editors’ Introduction to the Special Issue on Machine Learning Architectures and Accelerators

9. Model-Free Reinforcement Learning and Bayesian Classification in System-Level Power Management

10. H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor

11. Zombie Chasing: Efficient Flash Management Considering Dirty Data in the Buffer Cache

12. Selecting an Optimal Fault Tolerance Strategy for Reliable Service-Oriented Systems with Local and Global Constraints

13. Improving Performance and Capacity of Flash Storage Devices by Exploiting Heterogeneity of MLC Flash Memory

14. Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion

15. Practical Temporal Prefetching With Compressed On-Chip Metadata

16. A Decentralized Mechanism Based on Differential Privacy for Privacy-Preserving Computation in Smart Grid

17. Bidirectional Multi-Constrained Routing Algorithms

18. HRT-PLRU: A New Paging Schemefor Executing Hard Real-Time Programson NAND Flash Memory

19. A Lightweight and Cooperative Multifactor Considered File Replication Method in Structured P2P Systems

20. A New Second-Order Side Channel Attack Based on Linear Regression

21. ReCREW: A Reliable Flash-Dissemination System

22. RFID Support for Accurate 3D Localization

23. Parameter-Aware I/O Management for Solid State Disks (SSDs)

24. Locality-Preserving Clustering and Discovery of Resources in Wide-Area Distributed Computational Grids

25. Designing Fast and Scalable XACML Policy Evaluation Engines

26. Automatic Abstraction of RTL IPs into Equivalent TLM Descriptions

27. Design and Evaluation of a Proxy Cache for Peer-to-Peer Traffic

28. A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code

29. Design of an Error-Tolerance Scheme for Discrete Wavelet Transform in JPEG 2000 Encoder

30. SLA-Based Scheduling of Spark Jobs in Hybrid Cloud Computing Environments

31. PITEM: Permutations-Based Instruction Tracking Via Electromagnetic Side-Channel Signal Analysis

32. Leveraging Register Windows to Reduce Physical Registers to the Bare Minimum

33. Efficient Verification and Optimization of Real-Time Logic-Specified Systems

34. Using Virtualization to Improve Software Rejuvenation

35. A Process Algebraic View of Latency-Insensitive Systems

36. Extending EFSMs to Specify and Test Timed Systems with Action Durations and Time-Outs

37. RACE: A Robust Adaptive Caching Strategy for Buffer Cache

38. Performance and Reliability of Tree-Structured Grid Services Considering Data Dependence and Failure Correlation

39. Quantum Existence Testing and Its Application for Finding Extreme Values in Unsorted Databases

40. A Hierarchical Modeling and Analysis for Grid Service Reliability

41. Dynamic Voltage Scaling in Multitier Web Servers with End-to-End Delay Control

42. An efficient NAND flash file system for flash memory storage

43. On the prediction of Java object lifetimes

44. Toward a theory for scheduling dags in Internet-based computing

45. In-line interrupt handling and lock-up free translation lookaside buffers (TLBs)

46. Affinity-driven system design exploration for heterogeneous multiprocessor SoC

47. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software

48. Objective-optimal algorithms for long-term Web prefetching

49. Selective Neuron Re-Computation (SNRC) for Error-Tolerant Neural Networks

50. λDNN: Achieving Predictable Distributed DNN Training With Serverless Architectures