• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,971
Next 10 →

The protection of information in computer systems

by Jerome H. Saltzer, Michael D. Schroeder
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sectio ..."
Abstract - Cited by 824 (2 self) - Add to MetaCart
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main

Fully Automated Production of Diverse 18F-Labeled PET Tracers on the ELIXYS Multireactor Radiosynthesizer Without Hardware Modification

by Mark Lazari, Jeffrey Collins, Bin Shen, Mohammed Farhoud, Daniel Yeh, On Maraglia, Frederick T. Chin, David A. Nathanson, Melissa Moore, R. Michael Van Dam
"... Fully automated radiosynthesizers are continuing to be de-veloped to meet the growing need for the reliable production of PET tracers made under current good manufacturing practice guidelines. There is a current trend toward supporting kitlike disposable cassettes that come preconfigured for particu ..."
Abstract - Add to MetaCart
Fully automated radiosynthesizers are continuing to be de-veloped to meet the growing need for the reliable production of PET tracers made under current good manufacturing practice guidelines. There is a current trend toward supporting kitlike disposable cassettes that come preconfigured for particular tracers, thus eliminating the need for cleaning protocols between syntheses and enabling quick transitions to synthe-sizing other tracers. Though ideal for production, these systems are often limited for the development of novel tracers because of pressure, temperature, and chemical compatibility consid-erations. This study demonstrated the versatile use of the ELIXYS fully automated radiosynthesizer to adapt and produce 8 different 18F-labeled PET tracers of varying complexity. Methods: Three-reactor syntheses of 2-deoxy-2-18F-fluoro-

Image and depth from a conventional camera with a coded aperture

by Anat Levin, Rob Fergus, Frédo Durand, William T. Freeman - ACM TRANS. GRAPH , 2007
"... A conventional camera captures blurred versions of scene information away from the plane of focus. Camera systems have been proposed that allow for recording all-focus images, or for extracting depth, but to record both simultaneously has required more extensive hardware and reduced spatial resolut ..."
Abstract - Cited by 278 (24 self) - Add to MetaCart
A conventional camera captures blurred versions of scene information away from the plane of focus. Camera systems have been proposed that allow for recording all-focus images, or for extracting depth, but to record both simultaneously has required more extensive hardware and reduced spatial

On supporting containment queries in relational database management systems

by Chun Zhang, Jeffrey Naughton, David Dewitt, Qiong Luo , 2001
"... Virtually all proposals for querying XML include a class of query we term “containment queries”. It is also clear that in the foreseeable future, a substantial amount of XML data will be stored in relational database systems. This raises the question of how to support these containment queries. The ..."
Abstract - Cited by 278 (6 self) - Add to MetaCart
outperform an inverted list engine. Our analysis further identifies two significant causes that differentiate the performance of the IR and RDBMS implementations: the join algorithms employed and the hardware cache utilization. Our results suggest that contrary to most expectations, with some modifications

Secure Program Execution via Dynamic Information Flow Tracking

by G. Edward Suh, Jaewook Lee, Srinivas Devadas , 2004
"... Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control to malevolen ..."
Abstract - Cited by 271 (3 self) - Add to MetaCart
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control

A survey of hardware trojan taxonomy and detection

by Mohammad Tehranipoor, Farinaz Koushanfar - IEEE Design & Test of Computers
"... design and fabrication process, ICs are becoming in-creasingly vulnerable to malicious activities and alter-ations. These vulnerabilities have raised serious concerns regarding possible threats to military sys-tems, financial infrastructures, transportation security, and household appliances. An adv ..."
Abstract - Cited by 76 (12 self) - Add to MetaCart
. An adversary can intro-duce a Trojan designed to disable or destroy a system at some future time, or the Trojan could leak confi-dential information and secret keys covertly to the ad-versary. Trojans can be implemented as hardware modifications to ASICs, commercial-off-the-shelf (COTS) parts, microprocessors

Ensemble-level Power Management for Dense Blade Servers

by Parthasarathy Ranganathan, Phil Leech, David Irwin, Jeffrey Chase, Hewlett Packard - In Proceedings of the International Symposium on Computer Architecture (ISCA , 2006
"... One of the key challenges for high-density servers (e.g., blades) is the increased costs in addressing the power and heat density associated with compaction. Prior approaches have mainly focused on reducing the heat generated at the level of an individual server. In contrast, this work proposes powe ..."
Abstract - Cited by 179 (21 self) - Add to MetaCart
chassis. Our approach requires low-cost hardware modifications and relatively simple software support. We evaluate our architecture through both prototyping and simulation. For workloads representing 132 servers from nine different enterprise deployments, we show significant power budget reductions

Speculative Lock Elision: Enabling Highly Concurrent Multithreaded Execution

by Ravi Rajwar, James R. Goodman , 2001
"... Serialization of threads due to critical sections is a fundamental bottleneck to achieving high performance in multithreaded programs. Dynamically, such serialization may be unnecessary because these critical sections could have safely executed concurrently without locks. Current processors cannot f ..."
Abstract - Cited by 227 (10 self) - Add to MetaCart
-level modifications, is transparent to programmers, and requires only trivial additional hardware support. SLE can provide programmers a fast path to writing correct high-performance multithreaded programs.

An efficient program for many-body simulation

by Andrew W. Appel - SIAM J. Sci. and Stat. Comput , 1985
"... Abstract. The simulation of N particles interacting in a gravitational force field is useful in astrophysics, but such simulations become costly for large N. Representing the universe as a tree structure with the particles at the leaves and internal nodes labeled with the centers of mass of their de ..."
Abstract - Cited by 166 (0 self) - Add to MetaCart
of their descendants allows several simultaneous attacks on the computation time required by the problem. These approaches range from algorithmic changes (replacing an O(N’) algorithm with an algorithm whose time-complexity is believed to be O(N log N)) to data structure modifications, code-tuning, and hardware

StackGhost: Hardware Facilitated Stack Protection

by Mike Frantzen, Mike Shuey - In Proceedings of the 10th USENIX Security Symposium , 2001
"... Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem 's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications' ret ..."
Abstract - Cited by 94 (0 self) - Add to MetaCart
Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem 's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications
Next 10 →
Results 1 - 10 of 1,971
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University