Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 62, Issue 7July 2013
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
ISSN:0018-9340
Reflects downloads up to 13 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
Architecting against Software Cache-Based Side-Channel Attacks

Using cache-like architectural components including data caches, instruction caches, or branch target buffers as a side channel, software cache-based side-channel attacks are able to derive secret keys used in cryptographic operations through legitimate ...

research-article
A Systematic Methodology to Generate Decomposable and Responsive Power Models for CMPs

Power modeling based on performance monitoring counters (PMCs) attracted the interest of researchers since it became a quick approach to understand the power behavior of real systems. Consequently, several power-aware policies use models to guide their ...

research-article
Expandable and Cost-Effective Network Structures for Data Centers Using Dual-Port Servers

A fundamental goal of data center networking is to efficiently interconnect a large number of servers with the low equipment cost. Several server-centric network structures for data centers have been proposed. They, however, are not truly expandable and ...

research-article
Generalization of an Enhanced ECC Methodology for Low Power PSRAM

Error control codes (ECCs) have been widely used to maintain the reliability of memories, but ordinary ECC codes are not suitable for memories with long codewords. For portable products, power reduction in memories with DRAM-like cells can be done by ...

research-article
Hybrid CPU Management for Adapting to the Diversity of Virtual Machines

As an important cornerstone for clouds, virtualization plays a vital role in building this emerging infrastructure. Virtual machines (VMs) with a variety of workloads may run simultaneously on a physical machine in the cloud platform. The scheduling ...

research-article
Improved Three-Way Split Formulas for Binary Polynomial and Toeplitz Matrix Vector Products

In this paper, we consider three-way split formulas for binary polynomial multiplication and Toeplitz matrix vector product (TMVP). We first recall the best known three-way split formulas for polynomial multiplication: the formulas with six recursive ...

research-article
L-Networks: A Topological Model for Regular 2D Interconnection Networks

A complete family of Cayley graphs of degree four, denoted as L-networks, is considered in this paper. L-networks are 2D mesh-based topologies with wrap-around connections. L-networks constitute a graph-based model which englobe many previously proposed ...

research-article
Low-Cost Concurrent Error Detection for Floating-Point Unit (FPU) Controllers

We present a nonintrusive concurrent error detection (CED) method for protecting the control logic of a contemporary floating-point unit (FPU). The proposed method is based on the observation that control logic errors lead to extensive data path ...

research-article
Modular Design of High-Throughput, Low-Latency Sorting Units

High-throughput and low-latency sorting is a key requirement in many applications that deal with large amounts of data. This paper presents efficient techniques for designing high-throughput, low-latency sorting units. Our sorting architectures utilize ...

research-article
On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains

Channel assignment is a crucial problem for wireless networks, especially for noncooperative wireless networks, in which nodes are selfish. While there have been a few studies of noncooperative, multiradio channel assignment, most existing studies are ...

research-article
Optimizing Nonindexed Join Processing in Flash Storage-Based Systems

Flash memory-based disks (or simply flash disks) have been widely used in today's computer systems. With their continuously increasing capacity and dropping price, it is envisioned that some database systems will operate on flash disks in the near ...

research-article
ReCREW: A Reliable Flash-Dissemination System

In this paper, we explore a new form of dissemination that arises in distributed, mission-critical applications called Flash Dissemination. This involves the rapid dissemination of rich information to a large number of recipients in a very short period ...

research-article
RFID Support for Accurate 3D Localization

This paper pursues RFID support for localization, aiming to pinpoint an object in 3D space. Given a set of RFID tags and/or readers deployed as reference points at known locations in a hexahedron (like shipping container or storage room), a passive and ...

research-article
Binary Integer Decimal-Based Floating-Point Multiplication

This paper presents a multiplier that operates on binary integer decimal (BID) encoded decimal floating-point (DFP) numbers. It uses a single binary multiplier with carry-save feedback for both significand multiplication and rounding, and it is ...

research-article
Multiway Splitting Method for Toeplitz Matrix Vector Product

Computing the product of a Toeplitz matrix and a vector arises in various applications including cryptography. In this paper, we consider Toeplitz matrices and vectors with entries in $({\hbox{\rlap{I}\kern 2.0pt{\hbox{F}}}}_2)$. For improved efficiency ...

research-article
Strong Diagnosability and Conditional Diagnosability of Multiprocessor Systems and Folded Hypercubes

Using the comparison diagnosis model, this study proposes some useful sufficient conditions for determining the strong diagnosability $(t_{s}(G))$ and the conditional diagnosability $(t_{c}(G))$ of a system $(G)$. Applying these results to an $(n)$--...

Comments