Sciweavers

6106 search results - page 1055 / 1222
» Modes for Software Architectures
Sort
View
145
Voted
HPCA
2005
IEEE
16 years 4 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
108
Voted
HPCA
2002
IEEE
16 years 4 months ago
Microarchitectural Simulation and Control of di/dt-induced Power Supply Voltage Variation
As the power consumption of modern highperformance microprocessors increases beyond 100W, power becomes an increasingly important design consideration. This paper presents a novel...
Ed Grochowski, David Ayers, Vivek Tiwari
134
Voted
HPCA
2001
IEEE
16 years 4 months ago
Dynamic Thermal Management for High-Performance Microprocessors
With the increasing clock rate and transistor count of today's microprocessors, power dissipation is becoming a critical component of system design complexity. Thermal and po...
David Brooks, Margaret Martonosi
208
Voted
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
16 years 3 months ago
System design issues in sensor databases
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Qiong Luo, Hejun Wu
SIGMOD
2005
ACM
157views Database» more  SIGMOD 2005»
16 years 3 months ago
Meta-data version and configuration management in multi-vendor environments
Nearly all components that comprise modern information technology, such as Computer Aided Software Engineering (CASE) tools, Enterprise Application Integration (EAI) environments,...
John R. Friedrich
« Prev « First page 1055 / 1222 Last » Next »