Steenkiste, P. A.
113  Ergebnisse:
Personensuche X
?
2

Exploiting Hierarchical Identity-Based Encryption for Acces..:

, In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05),
Hengartner, U. ; Steenkiste, P. - p. 384,385,386,387,388,389,390,391,392,393,394,395,396 , 2005
 
?
5

Architecture and evaluation of a high-speed networking subs..:

Steenkiste, P. ; Hemy, M. ; Mummert, T..
ACM SIGARCH Computer Architecture News.  22 (1994)  2 - p. 154-163 , 1994
 
?
7

Architecture and evaluation of a high-speed networking subs..:

, In: Proceedings of the 21st annual international symposium on Computer architecture,
Steenkiste, P. ; Hemy, M. ; Mummert, T.. - p. 154-163 , 1994
 
?
8

Protocol implementation on the Nectar Communication Process..:

, In: Proceedings of the ACM symposium on Communications architectures & protocols,
Cooper, E. C. ; Steenkiste, P. A. ; Sansom, R. D.. - p. 135-144 , 1990
 
?
9

Protocol implementation on the Nectar Communication Process..:

Cooper, E. C. ; Steenkiste, P. A. ; Sansom, R. D..
ACM SIGCOMM Computer Communication Review.  20 (1990)  4 - p. 135-144 , 1990
 
?
10

The impact of code density on instruction cache performance:

, In: Proceedings of the 16th annual international symposium on Computer architecture,
Steenkiste, P. - p. 252-259 , 1989
 
?
11

The impact of code density on instruction cache performance:

Steenkiste, P.
ACM SIGARCH Computer Architecture News.  17 (1989)  3 - p. 252-259 , 1989
 
?
13

A 32b microprocessor with on-chip 2Kbyte instruction cache:

, In: 1987 IEEE International Solid-State Circuits Conference. Digest of Technical Papers,
Horowitz, M. ; Hennessy, J. ; Chow, P.... - p. 30,31 , 1987
 
?
 
1-15