Sciweavers

8740 search results - page 1683 / 1748
» The Management of Replicated Data
Sort
View
157
Voted
DSN
2007
IEEE
15 years 11 months ago
Utilizing Dynamically Coupled Cores to Form a Resilient Chip Multiprocessor
Aggressive CMOS scaling will make future chip multiprocessors (CMPs) increasingly susceptible to transient faults, hard errors, manufacturing defects, and process variations. Exis...
Christopher LaFrieda, Engin Ipek, José F. M...
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
15 years 11 months ago
Strategic and Institutional Perspectives in the Adoption and Early Integration of Radio Frequency Identification (RFID)
Using multiple lenses of strategic choice theories (diffusion of innovation, organizational innovativeness) and institutional theory as the basis and reflecting data from semi-str...
Aditya Sharma, Alex Citurs, Benn R. Konsynski
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 11 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
IPPS
2007
IEEE
15 years 11 months ago
A Cost-Effective, High Bandwidth Server I/O network Architecture for Cluster Systems
In this paper we present a cost-effective, high bandwidth server I/O network architecture, named PaScal (Parallel and Scalable). We use the PaScal server I/O network to support da...
Hsing-bung Chen, Gary Grider, Parks Fields
CCS
2007
ACM
15 years 10 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
« Prev « First page 1683 / 1748 Last » Next »