Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where William E. Hall is active.

Publication


Featured researches published by William E. Hall.


Ibm Journal of Research and Development | 2015

Advanced features in IBM POWER8 systems

Balaram Sinharoy; Randal C. Swanberg; Naresh Nayar; Bruce Mealey; Jeffrey A. Stuecheli; Berni Schiefer; Jens Leenstra; J. Jann; Philipp Oehler; David Stephen Levitan; Susan E. Eisen; D. Sanner; Thomas Pflueger; Cedric Lichtenau; William E. Hall; T. Block

The IBM POWER8™ processor includes many innovative features that enable efficient and flexible computing, along with enhancements in virtualization, security, and serviceability. These features benefit application performance, and big data and analytics computing, as well as the cloud environment. Notable features include the capabilities to dynamically and efficiently change the number of threads active on a processor, enhancing application performance via integer vector operations, encryption accelerations, and reference history arrays. Also notable is improved virtual machine density (supporting multiple simultaneous partitions per core and providing fine-grain power management), allowing continuous monitoring of system performance as well as significantly enhanced system RAS (reliability, availability, and serviceability) and security. Each of these features is technologically complex and advanced. This paper provides an in-depth description of some of these features and their exploitation through systems software and middleware. These features will continue to bring value to the system-of-record workloads in the enterprise. They also make POWER8 systems well-suited for serving the needs of newer workloads such as big data and analytics, while efficiently supporting deployment in cloud environments.


Archive | 1995

Secure computer architecture

William E. Hall; Guerney D. H. Hunt; Paul A. Karger; Mark F. Mergen; David Robert Safford; David C. Toll


Archive | 2004

Secure data transfer over a network

Santosh P. Gaur; William E. Hall


Archive | 2004

Secure memory caching structures for data, integrity and version values

William E. Hall


Archive | 2002

Control function employing a requesting master id and a data address to qualify data access within an integrated system

Edward K. Evans; Eric M. Foster; Dennis E. Franklin; William E. Hall


Archive | 1997

Optical wavelength division multiplexer for coupling to data sources and sinks, wherein at least two data sources and sinks operate with different communication protocols

Michael M. Choy; Paul E. Green; William E. Hall; Frank J. Janniello; Jeff K. Kravitz; Karen Liu; Rajiv Ramaswami; F. Tong


Archive | 2002

Control function implementing selective transparent data authentication within an integrated system

Eric M. Foster; William E. Hall; Marcel-Catalin Rosu


IACR Cryptology ePrint Archive | 2014

The Hash Function "Fugue".

Shai Halevi; William E. Hall; Charanjit S. Jutla


Archive | 2010

Physically unclonable function implemented through threshold voltage comparison

Joel T. Ficke; William E. Hall; Terence B. Hook; Michael A. Sperling; Larry Wissel


Archive | 2003

Computing device that securely runs authorized software

Richard H. Boivie; William E. Hall

Researchain Logo
Decentralizing Knowledge