Sciweavers

4171 search results - page 733 / 835
» Dependable Data Management in Dynamic Distributed Systems
Sort
View
ICCAD
2008
IEEE
140views Hardware» more  ICCAD 2008»
16 years 1 months ago
Correct-by-construction microarchitectural pipelining
— This paper presents a method for correct-by-construction microarchitectural pipelining that handles cyclic systems with dependencies between iterations. Our method combines pre...
Timothy Kam, Michael Kishinevsky, Jordi Cortadella...
CSCW
2010
ACM
16 years 1 months ago
Gone but not forgotten: designing for disconnection in synchronous groupware
Synchronous groupware depends on the assumption that people are fully connected to the others in the group, but there are many situations (network delay, network outage, or explic...
Carl Gutwin, T. C. Nicholas Graham, Christopher Wo...
ICRA
2009
IEEE
96views Robotics» more  ICRA 2009»
15 years 11 months ago
Harnessing bacterial power in microscale actuation
— This paper presents a systematic analysis of the motion of microscale structures actuated by flagellated bacteria. We perform the study both experimentally and theoretically. ...
A. Agung Julius, M. Selman Sakar, Edward Steager, ...
WSC
2000
15 years 5 months ago
Use of discrete event simulation to validate an agent based scheduling engine
This paper discusses the use of simulation in a new context. Most often QUEST is viewed as a stand-alone simulation tool to analyze and understand shop floor behavior. It has rare...
Shubhabrata Biswas, Sara Merchawi
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 11 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo