Sciweavers

212 search results - page 23 / 43
» Implementation of an Internet-controlled system under variab...
Sort
View
EUROSYS
2007
ACM
14 years 4 months ago
Sweeper: a lightweight end-to-end system for defending against fast worms
The vulnerabilities which plague computers cause endless grief to users. Slammer compromised millions of hosts in minutes; a hit-list worm would take under a second. Recently prop...
Joseph Tucek, James Newsome, Shan Lu, Chengdu Huan...
DATE
2002
IEEE
96views Hardware» more  DATE 2002»
14 years 11 days ago
A Linear-Centric Simulation Framework for Parametric Fluctuations
The relative tolerances for interconnect and device parameter variations have not scaled with feature sizes which have brought about significant performance variability. As we sca...
Emrah Acar, Sani R. Nassif, Lawrence T. Pileggi
IJCM
2002
73views more  IJCM 2002»
13 years 7 months ago
Space-Time Equations for Non-Unimodular Mappings
Abstract. The class of systems of uniform recurrence equations (UREs) is closed under unimodular transformations. As a result, every systolic array described by a unimodular mappin...
Jingling Xue, Patrick M. Lenders
ISSTA
2000
ACM
13 years 11 months ago
Requirements-based monitors for real-time systems
—Before designing safety- or mission-critical real-time systems, a specification of the required behavior of the system should be produced and reviewed by domain experts. After ...
Dennis K. Peters, David Lorge Parnas
FGR
2006
IEEE
135views Biometrics» more  FGR 2006»
14 years 1 months ago
Adding Holistic Dimensions to a Facial Composite System
Facial composites are typically constructed by witnesses to crime by describing a suspect's face and then selecting facial features from a kit of parts. Unfortunately, when p...
Charlie D. Frowd, Vicki Bruce, Alex H. McIntyre, P...