Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James A. Sutton is active.

Publication


Featured researches published by James A. Sutton.


international symposium on microarchitecture | 1991

iWarp: a 100-MOPS, LIW microprocessor for multicomputers

Craig B. Peterson; James A. Sutton; Paul Wiley

An architecture that efficiently supports both message-passing and systolic communications in one system is presented. This architecture incorporates a variety of innovative features unifying both computational power and communications flexibility in one VLSI component, the iWarp microprocessor. The message-based communication model is discussed, and an overview of the architecture is given. Two principle iWarp components, called the communication agent and the computation agent, and the register file they share are described. The efficiencies of word-level communication are examined. The software development environment is also described.<<ETX>>


Archive | 2000

Executing isolated mode instructions in a secure system running in privilege rings

Carl M. Ellison; Roger A. Golliver; Howard C. Herbert; Derrick C. Lin; Francis X. McKeen; Gilbert Neiger; Ken Reneris; James A. Sutton; Shreekant S. Thakkar; Millind Mittal


Archive | 2003

Controlling access to multiple memory zones in an isolated execution environment

Carl M. Ellison; Roger A. Golliver; Howard C. Herbert; Derrick C. Lin; Francis X. McKeen; Gilbert Neiger; Ken Reneris; James A. Sutton; Shreekant S. Thakkar; Millind Mittal


Archive | 2001

Authenticated code method and apparatus

Andrew F. Glew; James A. Sutton; Lawrence O. Smith; David W. Grawrock; Gilbert Neiger; Michael Kozuch


Archive | 2000

Controlling access to multiple isolated memories in an isolated execution environment

Carl M. Ellison; Roger A. Golliver; Howard C. Herbert; Derrick C. Lin; Francis X. McKeen; Gilbert Neiger; Ken Reneris; James A. Sutton; Shreekant S. Thakkar; Millind Mittal


Archive | 2001

Authenticated code module

Andrew F. Glew; James A. Sutton; Lawrence O. Smith; David W. Grawrock; Gilbert Neiger; Michael Kozuch


Archive | 2005

Platform and method for remote attestation of a platform

Howard C. Herbert; David W. Grawrock; Carl M. Ellison; Roger A. Golliver; Derrick C. Lin; Francis X. McKeen; Gilbert Neiger; Ken Reneris; James A. Sutton; Shreekant S. Thakkar; Millind Mittal


Archive | 2000

Controlling accesses to isolated memory using a memory controller for isolated execution

Carl M. Ellison; Roger A. Golliver; Howard C. Herbert; Derrick C. Lin; Francis X. McKeen; Gilbert Neiger; Ken Reneris; James A. Sutton; Shreekant S. Thakkar; Millind Mittal


Archive | 2001

Platform and method for establishing provable identities while maintaining privacy

Carl M. Ellison; James A. Sutton


Archive | 2001

Processor supporting execution of an authenticated code instruction

Andrew F. Glew; James A. Sutton; Lawrence O. Smith; David W. Grawrock; Gilbert Neiger; Michael Kozuch

Researchain Logo
Decentralizing Knowledge