Ramesh V. Peri

Learn More
Computer security is the protection of the resources of a computer against events that can result in loss of availability, unauthorized access, or modification of data. The techniques devised to protect computers from these attacks are general purpose in nature and therefore cannot directly enforce security that has no universal definition. The high degree(More)
The neurosecretory anterior pituitary GH(4)C(1) cells exhibit the high voltage-activated dihydropyridine-sensitive L-type and the low voltage-activated T-type calcium currents. The activity of L-type calcium channels is tightly coupled to secretion of prolactin and other hormones in these cells. Depolarization induced by elevated extracellular K(+) reduces(More)
Information $ow predicates are properties of sets of traces and therefore cannot be handled under the Alp-ern-Schneider framework and the Abadi-Lnmport Composition Principle. McLean proposed a theory in iMCL941 to investigate the composition properties of these predicates and derived a partial order on them. In this paper we present an alternate framework(More)
Code density is an important issue in memory constrained processors. Echo Technology (ET) can be employed to replace a repeating code sequence with a single ECHO instruction. Its usefulness for code size reduction has been demonstrated on JAVA bytecode and RISC binaries. In this paper, we evaluate its effectiveness for IA32 binaries. Common perception(More)
Code density is an important issue in memory constrained systems. Some RISC processor, e.g. the THUMB extension in the ARM processor, supports aggressive code size reduction even at the cost of significant performance loss. In this paper, we develop an algorithm that utilizes a set of novel variable length Echo instructions and evaluate its effectiveness(More)
The size and speed of first-level caches and SRAMs of embedded processors continue to increase in response to demands for higher performance. In power-sensitive devices like PDAs and cellular handsets, decreasing power consumption while increasing performance is desirable. Contemporary caches typically exploit locality in memory access patterns but do not(More)
Kv beta 2 enhances the rate of inactivation and level of expression of Kv1.4 currents. The crystal structure of Kv beta 2 binds NADP(+), and it has been suggested that Kv beta 2 is an oxidoreductase enzyme (). To investigate how this function might relate to channel modulation, we made point mutations in Kv beta 2 in either the NADPH docking or putative(More)
  • 1