Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Cathy May"'
Autor:
Elaine R. Palmer, Kenneth Alan Goldman, Bharata Bhasker Rao, Hani Jamjoom, Lawrence Roy, Janani Janakirman, Brad Frey, Laurent Dufour, Ramachandra N. Pai, John M. Ludden, Cathy May, Guerney D. H. Hunt, Jeffrey A. Stuecheli, Wendel Glenn Voigt, Enriquillo Valdez, Sukadev Bhattiprolu, Mohit Kapur, Rick Boivie, William A. Starke, Paul Mackerras, Michael V. Le, Ryan P. Grimm
Publikováno v:
EuroSys
This paper presents Protected Execution Facility (PEF), a virtual machine-based Trusted Execution Environment (TEE) for confidential computing on Power ISA. PEF enables protected secure virtual machines (SVMs). Like other TEEs, PEF verifies the SVM p
Publikováno v:
ISCA
On the twentieth anniversary of the original publication [10], following ten years of intense activity in the research literature, hardware support for transactional memory (TM) has finally become a commercial reality, with HTM-enabled chips currentl
Autor:
Cathy May Slack, Anne Strode
Publikováno v:
South African Journal of Bioethics and Law; Vol 9, No 1 (2016); 35-38
South African Journal of Bioethics and Law, Vol 9, Iss 1, Pp 35-35 (2016)
South African Journal of Bioethics and Law, Vol 9, Iss 1, Pp 35-35 (2016)
Research ethics committees (RECs) in South Africa may require consent from a parent or legal guardian for child research. In instances where an REC determines that parental or guardianship consent is required, how far should researchers go to establi
Publikováno v:
2012 Oceans.
This paper concerns the Microwave Radiometer (MWR) instrument on the Aquarius/SAC-D satellite, and it discusses the development of a signal processing algorithm to infer rain rate over oceans using the measured MWR microwave brightness temperatures.
Autor:
Derek Edward Williams, Takuya Nakaike, Hung Q. Le, William J. Starke, Guy Lynn Guthrie, Brad Frey, Maged M. Michael, Cathy May, Rei Odaira
Publikováno v:
IBM Journal of Research and Development. 59:8:1-8:14
With multi-core processors, parallel programming has taken on greater importance. Traditional parallel programming techniques based on critical sections controlled by locking have several well-known drawbacks. To allow for more efficient parallel pro
Autor:
Dunstan, Cathy May cathymayteach@epbfi.com, Block, Joshua blockjoshua@yahoo.com, Anderson, Emily eanderson2@capital.edu, Proctor, Mika mproctor@cae.rrps.kl2.nm.us, Johnson, April apriljohnsonl978@aol.com, Cane, Sarah sarahcane1@gmail.com
Publikováno v:
Kodály Envoy. Fall2015, Vol. 42 Issue 1, p35-36. 2p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.