Sciweavers

2178 search results - page 361 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 2 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
FPL
2007
Springer
105views Hardware» more  FPL 2007»
14 years 2 months ago
Time Predictable CPU and DMA Shared Memory Access
In this paper, we propose a first step towards a time predictable computer architecture for single-chip multiprocessing (CMP). CMP is the actual trend in server and desktop syste...
Christof Pitter, Martin Schoeberl
IWCMC
2006
ACM
14 years 1 months ago
Budgeting power: packet duplication and bit error rate reduction in wireless ad-hoc networks
In this paper we present and evaluate a new technique to lower packet-level error rates of application layer connections in wireless ad-hoc networks. In our scheme, data packets s...
Ghassen Ben Brahim, Bilal Khan
CIMCA
2005
IEEE
14 years 1 months ago
Applying a Web-Service-Based Model to Dynamic Service-Deployment
Owing to the increase in both heterogeneity and complexity in today’s networking systems, the need arises for an architecture for network-based services that provides flexibilit...
Christos Chrysoulas, Evangelos Haleplidis, Robert ...
HICSS
2005
IEEE
130views Biometrics» more  HICSS 2005»
14 years 1 months ago
BiRD: A Strategy to Autonomously Supplement Clinical Practice Guidelines with Related Clinical Studies
In this paper we introduce a framework to supplement and tag computerized CPG with related best-evidence automatically sourced from on-line medical literature repositories. The id...
Syed Sibte Raza Abidi, Michael Kershaw, Evangelos ...