共 50 条
[41]
Hardware-based Cyber Threats
[J].
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2018,
:259-266
[45]
Performance characterization of a data mining application via hardware-based monitoring
[J].
COMMERCIAL APPLICATIONS FOR HIGH-PERFORMANCE COMPUTING,
2001, 4528
:109-117
[46]
Hardware-based Thermal-Aware Register-Renaming Technique in Microprocessors
[J].
INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL,
2010, 13 (02)
:389-407
[47]
Effective hardware-based two-way loop cache for high performance low power processors
[J].
2000 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN: VLSI IN COMPUTERS & PROCESSORS, PROCEEDINGS,
2000,
:403-407
[48]
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:131-145
[49]
Future execution: A hardware prefetching technique for chip multiprocessors
[J].
PACT 2005: 14TH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES,
2005,
:350-360
[50]
Tolerating Memory Latency Using a Hardware-based Active-pushing Technique
[J].
2009 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS,
2009,
:407-411