Sciweavers

11739 search results - page 2244 / 2348
» Slideshow: functional presentations
Sort
View
CASES
2006
ACM
14 years 18 days ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
CC
2006
Springer
125views System Software» more  CC 2006»
14 years 18 days ago
Path-Based Reuse Distance Analysis
Abstract. Profiling can effectively analyze program behavior and provide critical information for feedback-directed or dynamic optimizations. Based on memory profiling, reuse dista...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...
CCS
2006
ACM
14 years 18 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
EEE
2004
IEEE
14 years 18 days ago
The Design of QoS Broker Algorithms for QoS-Capable Web Services
QoS (Quality of Service) support in Web services is an important issue since it ensures service usability and utility for each client and, in addition, improves server utilization...
Tao Yu, Kwei-Jay Lin
FCCM
2004
IEEE
118views VLSI» more  FCCM 2004»
14 years 18 days ago
Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor
Reconfigurable System-on-Chip (SoC) platforms that incorporate hard-core processors surrounded by large amounts of FPGA are today commodities: the reconfigurable logic is often us...
Miljan Vuletic, Laura Pozzi, Paolo Ienne
« Prev « First page 2244 / 2348 Last » Next »