Sciweavers

2979 search results - page 558 / 596
» Computation and the Periodic Table
Sort
View
CCS
2008
ACM
13 years 12 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
CONEXT
2005
ACM
13 years 12 months ago
Achieving sub-50 milliseconds recovery upon BGP peering link failures
We first show by measurements that BGP peering links fail as frequently as intradomain links and usually for short periods of time. We propose a new fast-reroute technique where ...
Olivier Bonaventure, Clarence Filsfils, Pierre Fra...
DAC
2008
ACM
13 years 11 months ago
Leakage power-aware clock skew scheduling: converting stolen time into leakage power reduction
Clock skew scheduling has been traditionally considered as a tool for improving the clock period in a sequential circuit. Timing slack is "stolen" from fast combinationa...
Min Ni, Seda Ogrenci Memik
EDCC
2008
Springer
13 years 11 months ago
A Distributed Approach to Autonomous Fault Treatment in Spread
This paper presents the design and implementation of the Distributed Autonomous Replication Management (DARM) framework built on top of the Spread group communication system. The ...
Hein Meling, Joakim L. Gilje
EUC
2008
Springer
13 years 11 months ago
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candida...
Lei Sun, Tatsuo Nakajima