Sciweavers

4085 search results - page 540 / 817
» Data Services - From Data to Containers
Sort
View
DSN
2007
IEEE
15 years 11 months ago
Using Register Lifetime Predictions to Protect Register Files against Soft Errors
— Device scaling and large integration increase the vulnerability of microprocessors to transient errors. One of the structures where errors can be most harmful is the register ï...
Pablo Montesinos, Wei Liu, Josep Torrellas
96
Voted
DSN
2007
IEEE
15 years 11 months ago
Improving Recoverability in Multi-tier Storage Systems
Enterprise storage systems typically contain multiple storage tiers, each having its own performance, reliability, and recoverability. The primary motivation for this multi-tier o...
Marcos Kawazoe Aguilera, Kimberly Keeton, Arif Mer...
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 11 months ago
Opportunistic Scheduling for Wireless Network Coding
— This paper addresses a scheduling problem for wireless network coding which has been recently proposed as a novel method to enhance the throughput in wireless networks. The wir...
Hiroyuki Yomo, Petar Popovski
134
Voted
ICDM
2007
IEEE
131views Data Mining» more  ICDM 2007»
15 years 11 months ago
Characterizing RNA Secondary-Structure Features and Their Effects on Splice-Site Prediction
— RNA molecules are distinguished by their sequence composition and by their three-dimensional shape, called the secondary structure. The secondary structure of a pre-mRNA sequen...
Rezarta Islamaj Dogan, Lise Getoor, W. John Wilbur
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
15 years 11 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...