Sciweavers

1916 search results - page 85 / 384
» Facilitating Communication in Software Development
Sort
View
ISCA
1996
IEEE
99views Hardware» more  ISCA 1996»
14 years 1 months ago
Coherent Network Interfaces for Fine-Grain Communication
Historically, processor accesses to memory-mapped device registers have been marked uncachable to insure their visibility to the device. The ubiquity of snooping cache coherence, ...
Shubhendu S. Mukherjee, Babak Falsafi, Mark D. Hil...
HASE
1997
IEEE
14 years 1 months ago
High-Coverage Fault Tolerance in Real-Time Systems Based on Point-to-Point Communication
: The distributed recovery block (DRB) scheme is a widely applicable approach for realizing both hardware and software fault tolerance in real-time distributed and parallel compute...
K. H. Kim, Chittur Subbaraman, Eltefaat Shokri
CCS
2007
ACM
14 years 3 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
CACM
2000
143views more  CACM 2000»
13 years 8 months ago
Embedding Robots into the Internet
With the explosive growth of embedded computing hardware, it is possible to conceive many new networked robotic applications for diverse domains ranging from urban search and resc...
Gaurav S. Sukhatme, Maja J. Mataric
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 3 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...