Sciweavers

181 search results - page 30 / 37
» Redundancy detection in service-oriented systems
Sort
View
ASPLOS
2004
ACM
14 years 2 months ago
Deconstructing storage arrays
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. Shear employs a set of controlled algorithms combined with statistical techniques to automat...
Timothy E. Denehy, John Bent, Florentina I. Popovi...
IPPS
2006
IEEE
14 years 2 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
TCSV
2002
139views more  TCSV 2002»
13 years 8 months ago
Localizing and segmenting text in images and videos
Many images--especially those used for page design on web pages--as well as videos contain visible text. If these text occurrences could be detected, segmented, and recognized auto...
Rainer Lienhart, Axel Wernicke
CASES
2006
ACM
14 years 9 days ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
EDCC
2006
Springer
14 years 7 days ago
SEU Mitigation Techniques for Microprocessor Control Logic
The importance of fault tolerance at the processor architecture level has been made increasingly important due to rapid advancements in the design and usage of high performance de...
T. S. Ganesh, Viswanathan Subramanian, Arun K. Som...