Sciweavers

492 search results - page 49 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
ISCA
1998
IEEE
125views Hardware» more  ISCA 1998»
14 years 5 days ago
Active Pages: A Computation Model for Intelligent Memory
Microprocessors and memory systems su er from a growing gap in performance. We introduce Active Pages, a computation model which addresses this gap by shifting data-intensive comp...
Mark Oskin, Frederic T. Chong, Timothy Sherwood
SIMPAR
2010
386views Robotics» more  SIMPAR 2010»
13 years 6 months ago
Virtual Robot Experimentation Platform V-REP: A Versatile 3D Robot Simulator
From exploring planets to cleaning homes, the reach and versatility of robotics is vast. The integration of actuation, sensing and control makes robotics systems powerful, but comp...
Marc Freese, Surya P. N. Singh, Fumio Ozaki, Nobut...
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 11 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
CASES
2004
ACM
13 years 11 months ago
Providing time- and space- efficient procedure calls for asynchronous software thread integration
Asynchronous Software Thread Integration (ASTI) provides fine-grain concurrency in real-time threads by statically scheduling (integrating) code from primary threads into secondar...
Vasanth Asokan, Alexander G. Dean
CAISE
2006
Springer
13 years 11 months ago
Deviational Analyses for Validating Regulations on Real Systems
Deviational analysis is a traditional way of exploring the safety of systems. The results of deviational analysis contribute to traditional safety cases and safety arguments. We ex...
Fiona Polack, Thitima Srivatanakul, Tim Kelly, Joh...