Sciweavers

103 search results - page 9 / 21
» A Contract-based Approach to Designing Safe Systems
Sort
View
IEEEPACT
2003
IEEE
14 years 28 days ago
Using Software Logging to Support Multi-Version Buffering in Thread-Level Speculation
In Thread-Level Speculation (TLS), speculative tasks generate memory state that cannot simply be combined with the rest of the system because it is unsafe. One way to deal with th...
María Jesús Garzarán, Milos P...
SAC
2011
ACM
12 years 10 months ago
I4Copter: an adaptable and modular quadrotor platform
Quadrotor helicopters are micro air vehicles with vertical take-off and landing capabilities controlled by varying the rotation speed of four fixed pitch propellers. Due to their...
Peter Ulbrich, Rüdiger Kapitza, Christian Har...
AISS
2010
119views more  AISS 2010»
13 years 5 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
ISCC
2008
IEEE
123views Communications» more  ISCC 2008»
14 years 2 months ago
Improving reliability and energy efficiency of disk systems via utilization control
As disk drives become increasingly sophisticated and processing power increases, one of the most critical issues of designing modern disk systems is data reliability. Although num...
Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xi...
ECBS
1999
IEEE
171views Hardware» more  ECBS 1999»
13 years 12 months ago
Metamodeling - Rapid Design and Evolution of Domain-Specific Modeling Environments
Model integrated computing (MIC) is gaining increased attention as an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific softwar...
Greg Nordstrom, Janos Sztipanovits, Gabor Karsai, ...