Sciweavers

1424 search results - page 152 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ISCA
2011
IEEE
270views Hardware» more  ISCA 2011»
13 years 1 days ago
Sampling + DMR: practical and low-overhead permanent fault detection
With technology scaling, manufacture-time and in-field permanent faults are becoming a fundamental problem. Multi-core architectures with spares can tolerate them by detecting an...
Shuou Nomura, Matthew D. Sinclair, Chen-Han Ho, Ve...
OSDI
2004
ACM
14 years 8 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
ASPDAC
2006
ACM
105views Hardware» more  ASPDAC 2006»
14 years 2 months ago
Speed binning aware design methodology to improve profit under parameter variations
—Designing high-performance systems with high yield under parameter variations has raised serious design challenges in nanometer technologies. In this paper, we propose a profit-...
Animesh Datta, Swarup Bhunia, Jung Hwan Choi, Saib...
VTS
2000
IEEE
89views Hardware» more  VTS 2000»
14 years 22 days ago
Fault Escapes in Duplex Systems
Hardware duplication techniques are widely used for concurrent error detection in dependable systems to ensure high availability and data integrity. These techniques are vulnerabl...
Subhasish Mitra, Nirmal R. Saxena, Edward J. McClu...
LREC
2008
106views Education» more  LREC 2008»
13 years 9 months ago
Methodologies for Designing and Recording Speech Databases for Corpus Based Synthesis
In this paper we share our experience and describe the methodologies that we have used in designing and recording large speech databases for applications requiring speech synthesi...
Luís C. Oliveira, Sérgio Paulo, Lu&i...