Sciweavers

3146 search results - page 580 / 630
» The use of compiler optimizations for embedded systems softw...
Sort
View
EUROSYS
2011
ACM
14 years 8 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
EMSOFT
2004
Springer
15 years 9 months ago
Scheduling within temporal partitions: response-time analysis and server design
As the bandwidth of CPUs and networks continues to grow, it becomes more attractive, for efficiency reasons, to share such resources among several applications with the minimum le...
Luís Almeida, Paulo Pedreiras
CCS
2005
ACM
15 years 10 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
139
Voted
BMCBI
2010
193views more  BMCBI 2010»
15 years 4 months ago
MZmine 2: Modular framework for processing, visualizing, and analyzing mass spectrometry-based molecular profile data
Background: Mass spectrometry (MS) coupled with online separation methods is commonly applied for differential and quantitative profiling of biological samples in metabolomic as w...
Tomás Pluskal, Sandra Castillo, Alejandro V...
IPSN
2010
Springer
15 years 11 months ago
Distributed estimation of linear acceleration for improved accuracy in wireless inertial motion capture
Motion capture using wireless inertial measurement units (IMUs) has many advantages over other techniques. Achieving accurate tracking with IMUs presents a processing challenge, e...
A. D. Young, M. J. Ling, D. K. Arvind