A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography DJ Malan, M Welsh, MD Smith 2004 First Annual IEEE Communications Society Conference on Sensor and Ad …, 2004 | 1029 | 2004 |
A high-performance microarchitecture with hardware-programmable functional units R Razdan, MD Smith Proceedings of the 27th annual international symposium on Microarchitecture …, 1994 | 543 | 1994 |
Computer method and apparatus for managing data objects in a distributed context N Leser, F Kyne, R Morgan, CB Barclay, EJ Gaudet, J Schoonmaker, ... US Patent 7,587,749, 2009 | 405 | 2009 |
Using path profiles to predict HTTP requests S Schechter, M Krishnan, MD Smith Computer Networks and ISDN Systems 30 (1-7), 457-467, 1998 | 378 | 1998 |
Limits on multiple instruction issue MD Smith, M Johnson, MA Horowitz Proceedings of the third international conference on Architectural support …, 1989 | 335 | 1989 |
Boosting beyond static scheduling in a superscalar processor MD Smith, MS Lam, MA Horowitz Proceedings of the 17th annual international symposium on Computer …, 1990 | 289 | 1990 |
System support for automatic profiling and optimization X Zhang, Z Wang, N Gloy, JB Chen, MD Smith ACM SIGOPS Operating Systems Review 31 (5), 15-26, 1997 | 268 | 1997 |
Procedure placement using temporal-ordering information N Gloy, MD Smith ACM Transactions on Programming Languages and Systems (TOPLAS) 21 (5), 977-1027, 1999 | 225 | 1999 |
A comparative analysis of schemes for correlated branch prediction C Young, N Gloy, MD Smith ACM SIGARCH Computer Architecture News 23 (2), 276-286, 1995 | 225 | 1995 |
Efficient superscalar performance through boosting MD Smith, M Horowitz, MS Lam Proceedings of the fifth international conference on Architectural support …, 1992 | 179 | 1992 |
Improving the accuracy of static branch prediction using branch correlation C Young, MD Smith ACM Sigplan Notices 29 (11), 232-241, 1994 | 172 | 1994 |
Quality and speed in linear-scan register allocation O Traub, G Holloway, MD Smith ACM SIGPLAN Notices 33 (5), 142-151, 1998 | 169 | 1998 |
Computer method and apparatus for securely managing data objects in a distributed context N Leser, F Kyne, R Morgan, C Barclay, E Gaudet, J Schoonmaker, ... US Patent App. 10/858,827, 2005 | 167 | 2005 |
Overcoming the challenges to feedback-directed optimization (keynote talk) MD Smith Proceedings of the ACM SIGPLAN workshop on Dynamic and adaptive compilation …, 2000 | 162 | 2000 |
Voltage emergency prediction: Using signatures to reduce operating margins VJ Reddi, MS Gupta, G Holloway, GY Wei, MD Smith, D Brooks 2009 IEEE 15th International Symposium on High Performance Computer …, 2009 | 148 | 2009 |
How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks SE Schechter, MD Smith Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003 | 147 | 2003 |
A generalized algorithm for graph-coloring register allocation MD Smith, N Ramsey, G Holloway Proceedings of the ACM SIGPLAN 2004 conference on Programming language …, 2004 | 141 | 2004 |
An introduction to Machine SUIF and its portable libraries for analysis and optimization MD Smith, G Holloway Division of Engineering and Applied Sciences, Harvard University, 2002 | 138 | 2002 |
Voltage smoothing: Characterizing and mitigating voltage noise in production processors via software-guided thread scheduling VJ Reddi, S Kanev, W Kim, S Campanoni, MD Smith, GY Wei, D Brooks 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture, 77-88, 2010 | 133 | 2010 |
Mining sentiment classification from political web logs KT Durant, MD Smith Proceedings of Workshop on Web Mining and Web Usage Analysis of the 12th ACM …, 2006 | 132 | 2006 |