Results 1 - 10
of
1,971
The protection of information in computer systems
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sectio ..."
Abstract
-
Cited by 824 (2 self)
- Add to MetaCart
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main
Fully Automated Production of Diverse 18F-Labeled PET Tracers on the ELIXYS Multireactor Radiosynthesizer Without Hardware Modification
"... Fully automated radiosynthesizers are continuing to be de-veloped to meet the growing need for the reliable production of PET tracers made under current good manufacturing practice guidelines. There is a current trend toward supporting kitlike disposable cassettes that come preconfigured for particu ..."
Abstract
- Add to MetaCart
Fully automated radiosynthesizers are continuing to be de-veloped to meet the growing need for the reliable production of PET tracers made under current good manufacturing practice guidelines. There is a current trend toward supporting kitlike disposable cassettes that come preconfigured for particular tracers, thus eliminating the need for cleaning protocols between syntheses and enabling quick transitions to synthe-sizing other tracers. Though ideal for production, these systems are often limited for the development of novel tracers because of pressure, temperature, and chemical compatibility consid-erations. This study demonstrated the versatile use of the ELIXYS fully automated radiosynthesizer to adapt and produce 8 different 18F-labeled PET tracers of varying complexity. Methods: Three-reactor syntheses of 2-deoxy-2-18F-fluoro-
Image and depth from a conventional camera with a coded aperture
- ACM TRANS. GRAPH
, 2007
"... A conventional camera captures blurred versions of scene information away from the plane of focus. Camera systems have been proposed that allow for recording all-focus images, or for extracting depth, but to record both simultaneously has required more extensive hardware and reduced spatial resolut ..."
Abstract
-
Cited by 278 (24 self)
- Add to MetaCart
A conventional camera captures blurred versions of scene information away from the plane of focus. Camera systems have been proposed that allow for recording all-focus images, or for extracting depth, but to record both simultaneously has required more extensive hardware and reduced spatial
On supporting containment queries in relational database management systems
, 2001
"... Virtually all proposals for querying XML include a class of query we term “containment queries”. It is also clear that in the foreseeable future, a substantial amount of XML data will be stored in relational database systems. This raises the question of how to support these containment queries. The ..."
Abstract
-
Cited by 278 (6 self)
- Add to MetaCart
outperform an inverted list engine. Our analysis further identifies two significant causes that differentiate the performance of the IR and RDBMS implementations: the join algorithms employed and the hardware cache utilization. Our results suggest that contrary to most expectations, with some modifications
Secure Program Execution via Dynamic Information Flow Tracking
, 2004
"... Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control to malevolen ..."
Abstract
-
Cited by 271 (3 self)
- Add to MetaCart
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control
A survey of hardware trojan taxonomy and detection
- IEEE Design & Test of Computers
"... design and fabrication process, ICs are becoming in-creasingly vulnerable to malicious activities and alter-ations. These vulnerabilities have raised serious concerns regarding possible threats to military sys-tems, financial infrastructures, transportation security, and household appliances. An adv ..."
Abstract
-
Cited by 76 (12 self)
- Add to MetaCart
. An adversary can intro-duce a Trojan designed to disable or destroy a system at some future time, or the Trojan could leak confi-dential information and secret keys covertly to the ad-versary. Trojans can be implemented as hardware modifications to ASICs, commercial-off-the-shelf (COTS) parts, microprocessors
Ensemble-level Power Management for Dense Blade Servers
- In Proceedings of the International Symposium on Computer Architecture (ISCA
, 2006
"... One of the key challenges for high-density servers (e.g., blades) is the increased costs in addressing the power and heat density associated with compaction. Prior approaches have mainly focused on reducing the heat generated at the level of an individual server. In contrast, this work proposes powe ..."
Abstract
-
Cited by 179 (21 self)
- Add to MetaCart
chassis. Our approach requires low-cost hardware modifications and relatively simple software support. We evaluate our architecture through both prototyping and simulation. For workloads representing 132 servers from nine different enterprise deployments, we show significant power budget reductions
Speculative Lock Elision: Enabling Highly Concurrent Multithreaded Execution
, 2001
"... Serialization of threads due to critical sections is a fundamental bottleneck to achieving high performance in multithreaded programs. Dynamically, such serialization may be unnecessary because these critical sections could have safely executed concurrently without locks. Current processors cannot f ..."
Abstract
-
Cited by 227 (10 self)
- Add to MetaCart
-level modifications, is transparent to programmers, and requires only trivial additional hardware support. SLE can provide programmers a fast path to writing correct high-performance multithreaded programs.
An efficient program for many-body simulation
- SIAM J. Sci. and Stat. Comput
, 1985
"... Abstract. The simulation of N particles interacting in a gravitational force field is useful in astrophysics, but such simulations become costly for large N. Representing the universe as a tree structure with the particles at the leaves and internal nodes labeled with the centers of mass of their de ..."
Abstract
-
Cited by 166 (0 self)
- Add to MetaCart
of their descendants allows several simultaneous attacks on the computation time required by the problem. These approaches range from algorithmic changes (replacing an O(N’) algorithm with an algorithm whose time-complexity is believed to be O(N log N)) to data structure modifications, code-tuning, and hardware
StackGhost: Hardware Facilitated Stack Protection
- In Proceedings of the 10th USENIX Security Symposium
, 2001
"... Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem 's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications' ret ..."
Abstract
-
Cited by 94 (0 self)
- Add to MetaCart
Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem 's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications
Results 1 - 10
of
1,971