Sciweavers

899 search results - page 125 / 180
» On Wiretap Networks II
Sort
View
NCA
2008
IEEE
14 years 3 months ago
Flexible Parameterization of XOR based Codes for Distributed Storage
Distributed storage systems apply erasure-tolerant codes to guarantee reliable access to data despite failures of storage resources. While many codes can be mapped to XOR operatio...
Peter Sobe, Kathrin Peter
DSN
2007
IEEE
14 years 3 months ago
Using Register Lifetime Predictions to Protect Register Files against Soft Errors
— Device scaling and large integration increase the vulnerability of microprocessors to transient errors. One of the structures where errors can be most harmful is the register ï...
Pablo Montesinos, Wei Liu, Josep Torrellas
DSN
2007
IEEE
14 years 3 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
NCA
2006
IEEE
14 years 2 months ago
Parallelization of Geant4 Using TOP-C and Marshalgen
Geant4 is a very large, highly accurate toolkit for Monte Carlo simulation of particle-matter interaction. It has been applied to high-energy physics, cosmic ray modeling, radiati...
Gene Cooperman, Viet Ha Nguyen, Igor Malioutov
STORAGESS
2006
ACM
14 years 2 months ago
The case for semantic aware remote replication
This paper argues that the network latency due to synchronous replication is no longer tolerable in scenarios where businesses are required by regulation to separate their seconda...
Xiaotao Liu, Gal Niv, Prashant J. Shenoy, K. K. Ra...