Sciweavers

190 search results - page 10 / 38
» Performance Evaluation of PIM-SM Recovery
Sort
View
MICRO
2009
IEEE
120views Hardware» more  MICRO 2009»
14 years 2 months ago
Tribeca: design for PVT variations with local recovery and fine-grained adaptation
With continued advances in CMOS technology, parameter variations are emerging as a major design challenge. Irregularities during the fabrication of a microprocessor and variations...
Meeta Sharma Gupta, Jude A. Rivers, Pradip Bose, G...
IDEAS
1997
IEEE
110views Database» more  IDEAS 1997»
13 years 11 months ago
Accommodating Logical Logging under Fuzzy Checkpointing in Main Memory Databases
This paper presents a simple and effective method to reduce the size of log data for recovery in main memory databases. Fuzzy checkpointing is known to be very efficient in main ...
Seung-Kyoon Woo, Myoung-Ho Kim, Yoon-Joon Lee
ASPLOS
2006
ACM
14 years 1 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
CN
2007
133views more  CN 2007»
13 years 7 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
CVPR
2009
IEEE
15 years 2 months ago
Nonrigid Shape Recovery by Gaussian Process Regression
Most state-of-the-art nonrigid shape recovery methods usually use explicit deformable mesh models to regularize surface deformation and constrain the search space. These triangu...
Jianke Zhu, Michael R. Lyu, Steven C. H. Hoi