82 results on '"Sethumadhavan, Simha"'
Search Results
2. How Much is Performance Worth to Users?
3. Revisiting Residue Codes for Modern Memories
4. Revisiting Residue Codes for Modern Memories
5. Towards Zero Trust: An Experience Report
6. HARDROID: Transparent Integration of Crypto Accelerators in Android
7. EPI: Efficient Pointer Integrity For Securing Embedded Systems
8. Unsupervised Anomaly-Based Malware Detection Using Hardware Features
9. No-FAT: Architectural Support for Low Overhead Memory Safety Checks
10. ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks
11. CRYLOGGER: Detecting Crypto Misuses Dynamically
12. Maintaining Enterprise Resiliency via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)
13. Distributed Storage of Large-Scale Multidimensional Electroencephalogram Data Using Hadoop and HBase
14. Composable Multicore Chips
15. WaC: A New Doctrine for Hardware Security
16. Architecture And Implementation Of The Trips Processor
17. SPARCHS: Symbiotic, Polymorphic, Automatic, Resilient, Clean-Slate, Host Security
18. Compiler Directed Parallelization of Loops in Scale for Shared-Memory Multiprocessors
19. Practical Byte-Granular Memory Blacklisting using Califorms
20. Secure Architectures
21. YOLO: frequently resetting cyber-physical systems for security
22. Heterogeneous Isolated Execution for Commodity GPUs
23. A Case Study in Analog Co-Processing for Solving Stochastic Differential Equations
24. Blacklist Core
25. Practical Memory Safety with REST
26. Corrections to “Energy-Efficient Hybrid Analog/Digital Approximate Computation in Continuous Time” [Jul 16 1514-1524]
27. Motivating Security-Aware Energy Management
28. Hybrid analog-digital solution of nonlinear partial differential equations
29. Why do programs have heavy tails?
30. Reviving instruction set randomization
31. Evaluation of an Analog Accelerator for Linear Algebra
32. Heavy Tails in Program Structure
33. Analog Computing in a Modern Context: A Linear Algebra Accelerator Case Study
34. Code relatives: detecting similarly behaving software
35. Hardware-Enforced Privacy
36. Energy-Efficient Hybrid Analog/Digital Approximate Computation in Continuous Time
37. Evaluation of an analog accelerator for linear algebra
38. Evaluation of an Analog Accelerator for Linear Algebra
39. RoboBench: Towards sustainable robotics system benchmarking
40. Making Lock-free Data Structures Verifiable with Artificial Transactions
41. Security Implications of Third-Party Accelerators
42. Hardware Enforced Statistical Privacy
43. Heisenbyte
44. The Spy in the Sandbox
45. Making lock-free data structures verifiable with artificial transactions
46. Increasing reconfigurability with memristive interconnects
47. Continuous-time hybrid computation with programmable nonlinearities
48. Trustworthy hardware from untrusted components
49. A silicon anti-virus engine
50. Guest Editorial: Robust and energy-secure systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.