Sciweavers

647 search results - page 96 / 130
» Simulating Failures on Large-Scale Systems
Sort
View
ASPLOS
2011
ACM
12 years 11 months ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
WSC
1998
13 years 9 months ago
Implementing the Theory of Constraints Philosophy in Highly Reentrant Systems
A significant challenge in implementing the Theory of Constraints in the semiconductor industry is the complex and reentrant nature of the manufacturing process. Managing a constr...
Clay Rippenhagen, Shekar Krishnaswamy
ASPLOS
2006
ACM
14 years 1 months ago
Ultra low-cost defect protection for microprocessor pipelines
The sustained push toward smaller and smaller technology sizes has reached a point where device reliability has moved to the forefront of concerns for next-generation designs. Sil...
Smitha Shyam, Kypros Constantinides, Sujay Phadke,...
IEEEARES
2006
IEEE
14 years 1 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
VTC
2006
IEEE
14 years 1 months ago
A Relay Skipping Method for a Multi-Hop DS-CDMA Virtual Cellular Network
— A multi-hop virtual cellular network (VCN) was proposed for future mobile communication systems. In VCN, the transmitted signal from a mobile terminal is relayed via multi-hop ...
Lalla Soundous El Alami, Eisuke Kudoh, Fumiyuki Ad...