Sciweavers

1818 search results - page 339 / 364
» How users use access control
Sort
View
134
Voted
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 7 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
109
Voted
BMCBI
2008
96views more  BMCBI 2008»
15 years 2 months ago
A PATO-compliant zebrafish screening database (MODB): management of morpholino knockdown screen information
Background: The zebrafish is a powerful model vertebrate amenable to high throughput in vivo genetic analyses. Examples include reverse genetic screens using morpholino knockdown,...
Michelle N. Knowlton, Tongbin Li, Yongliang Ren, B...
159
Voted
VRST
2004
ACM
15 years 8 months ago
Animating reactive motions for biped locomotion
In this paper, we propose a new method for simulating reactive motions for running or walking human figures. The goal is to generate realistic animations of how humans compensate...
Taku Komura, Howard Leung, James Kuffner
141
Voted
NSDI
2010
15 years 4 months ago
Reverse traceroute
Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to help identify routing failures, poor performance, and router misconfigurations. Rese...
Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay Ku...
129
Voted
ASPLOS
2006
ACM
15 years 4 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic