Sciweavers

832 search results - page 109 / 167
» Effect of Malicious Synchronization
Sort
View
ECBS
2009
IEEE
164views Hardware» more  ECBS 2009»
14 years 4 months ago
Semantically Enhanced Containers for Concurrent Real-Time Systems
Future space missions, such as Mars Science Laboratory, are built upon computing platforms providing a high degree of autonomy and diverse functionality. The increased sophisticat...
Damian Dechev, Peter Pirkelbauer, Nicolas Rouquett...
HICSS
2002
IEEE
171views Biometrics» more  HICSS 2002»
14 years 2 months ago
Asynchronous Videoconferencing: A Hybrid Communication Prototype
This report introduces a hybrid asynchronous, distributed audio/video group conferencing system. One of the chief benefits of Internet communication systems is that they allow com...
James H. Watt, Joseph B. Walther, Kristine L. Nowa...
SIGMOD
1996
ACM
133views Database» more  SIGMOD 1996»
14 years 2 months ago
Multi-dimensional Resource Scheduling for Parallel Queries
Scheduling query execution plans is an important component of query optimization in parallel database systems. The problem is particularly complex in a shared-nothing execution en...
Minos N. Garofalakis, Yannis E. Ioannidis
SIGSOFT
2003
ACM
14 years 10 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
MOBISYS
2007
ACM
14 years 9 months ago
SmartSiren: virus detection and alert for smartphones
Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devi...
Jerry Cheng, Starsky H. Y. Wong, Hao Yang, Songwu ...