Toward security as a service: A trusted cloud service architecture with policy customization | 0 | 0.34 | 2021 |
KV-FTL: A Novel Key-Value-Based FTL Scheme for Large Scale SSDs | 0 | 0.34 | 2017 |
Redesign the Memory Allocator for Non-Volatile Main Memory. | 2 | 0.41 | 2017 |
Rio: Fast B+-Tree Based on Remote Accessible Non-Volatile Memory | 0 | 0.34 | 2017 |
InnerCache: A Tactful Cache Mechanism for RDMA-Based Key-Value Store | 0 | 0.34 | 2016 |
HIFFS: A Hybrid Index for Flash File System | 0 | 0.34 | 2015 |
Customized Core Layout: A Case Study on Dual-Core Dynamic Binary Translation System | 0 | 0.34 | 2014 |
Binary compatibility for embedded systems using greedy subgraph mapping. | 12 | 0.38 | 2014 |
HEUSPEC: A Software Speculation Parallel Model | 4 | 0.45 | 2013 |
An approach to minimizing the interpretation overhead in Dynamic Binary Translation. | 2 | 0.41 | 2012 |
A Formalization of an Emulation Based Co-designed Virtual Machine | 0 | 0.34 | 2011 |
A novel chaining approach to indirect control transfer instructions | 1 | 0.38 | 2011 |
Characterizing Fine-Grain Parallelism on Modern Multicore Platform | 2 | 0.38 | 2011 |
GSM: An Efficient Code Generation Algorithm for Dynamic Binary Translator | 1 | 0.43 | 2011 |
An Emulator for Executing IA-32 Applications on ARM-Based Systems. | 0 | 0.34 | 2010 |
Using Pcache To Speedup Interpretation In Dynamic Binary Translation | 4 | 0.75 | 2009 |
A Light-weight Code Cache Design for Dynamic Binary Translation | 1 | 0.38 | 2009 |
A Hardware Approach for Reducing Interpretation Overhead | 2 | 0.39 | 2009 |
A New Approach to Single Event Effect Tolerance Based on Asynchronous Circuit Technique | 6 | 0.51 | 2008 |
A Novel Hardware Assisted Full Virtualization Technique | 9 | 0.76 | 2008 |
DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture | 1 | 0.43 | 2008 |
Improving the Fault Tolerance of a Computer System with Space-Time Triple Modular Redundancy | 1 | 0.39 | 2006 |
Two New Space-Time Triple Modular Redundancy Techniques for Improving Fault Tolerance of Computer Systems | 5 | 0.57 | 2006 |
The Optimality Analysis of Hybrid Reinforcement Learning Combined with SVMs | 0 | 0.34 | 2006 |
A bias-tuned dishonesty-resistant reputation evaluation method for trust establishment in grid | 4 | 0.46 | 2006 |