Sciweavers

2421 search results - page 414 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
SIGIR
2004
ACM
14 years 3 months ago
A music recommender based on audio features
Many collaborative music recommender systems (CMRS) have succeeded in capturing the similarity among users or items based on ratings, however they have rarely considered about the...
Qing Li, Byeong Man Kim, Donghai Guan, Duk whan Oh
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 3 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
DFT
2003
IEEE
142views VLSI» more  DFT 2003»
14 years 3 months ago
Exploiting Instruction Redundancy for Transient Fault Tolerance
This paper presents an approach for integrating fault-tolerance techniques into microprocessors by utilizing instruction redundancy as well as time redundancy. Smaller and smaller...
Toshinori Sato
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
14 years 3 months ago
Taming the component timing: A CBD methodology for real-time embedded systems
—The growing trend towards using component based design approach in embedded system development requires addressing newer system engineering challenges. These systems are usually...
Manoj G. Dixit, Pallab Dasgupta, S. Ramesh
DAC
2007
ACM
14 years 1 months ago
Skewed Flip-Flop Transformation for Minimizing Leakage in Sequential Circuits
Mixed Vt has been widely used to control leakage without affecting circuit performance. However, current approaches target the combinational circuits even though sequential elemen...
Jun Seomun, Jaehyun Kim, Youngsoo Shin