Sciweavers

12673 search results - page 2446 / 2535
» Learning while designing
Sort
View
DRM
2006
Springer
15 years 5 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
144
Voted
EDCC
2006
Springer
15 years 5 months ago
SEU Mitigation Techniques for Microprocessor Control Logic
The importance of fault tolerance at the processor architecture level has been made increasingly important due to rapid advancements in the design and usage of high performance de...
T. S. Ganesh, Viswanathan Subramanian, Arun K. Som...
133
Voted
EMSOFT
2006
Springer
15 years 5 months ago
Reliability mechanisms for file systems using non-volatile memory as a metadata store
Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM) to hold all of their data and metadata, and larger systems can store metadata...
Kevin M. Greenan, Ethan L. Miller
143
Voted
ERCIMDL
2006
Springer
204views Education» more  ERCIMDL 2006»
15 years 5 months ago
Comparing and Combining Two Approaches to Automated Subject Classification of Text
A machine-learning and a string-matching approach to automated subject classification of text were compared, as to their performance, advantages and downsides. The former approach ...
Koraljka Golub, Anders Ardö, Dunja Mladenic, ...
FPGA
2006
ACM
113views FPGA» more  FPGA 2006»
15 years 5 months ago
Optimality study of logic synthesis for LUT-based FPGAs
Abstract--Field-programmable gate-array (FPGA) logic synthesis and technology mapping have been studied extensively over the past 15 years. However, progress within the last few ye...
Jason Cong, Kirill Minkovich
« Prev « First page 2446 / 2535 Last » Next »