Sciweavers

210 search results - page 34 / 42
» Run-time Detection in Parallel and Distributed Systems: Appl...
Sort
View
HPCA
2005
IEEE
14 years 9 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICRA
2010
IEEE
104views Robotics» more  ICRA 2010»
13 years 7 months ago
Multi-camera object detection for robotics
— Robust object detection is a critical skill for robotic applications in complex environments like homes and offices. In this paper we propose a method for using multiple camer...
Adam Coates, Andrew Y. Ng
ISLPED
2004
ACM
139views Hardware» more  ISLPED 2004»
14 years 2 months ago
Eliminating voltage emergencies via microarchitectural voltage control feedback and dynamic optimization
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Kim M. Hazelwood, David Brooks
GLOBECOM
2007
IEEE
14 years 2 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...
ICPP
2008
IEEE
14 years 3 months ago
Solving Large, Irregular Graph Problems Using Adaptive Work-Stealing
Solving large, irregular graph problems efficiently is challenging. Current software systems and commodity multiprocessors do not support fine-grained, irregular parallelism wel...
Guojing Cong, Sreedhar B. Kodali, Sriram Krishnamo...