Sciweavers

384 search results - page 65 / 77
» Trust as dependence: a logical approach
Sort
View
ICDE
1999
IEEE
107views Database» more  ICDE 1999»
14 years 9 months ago
Using Codewords to Protect Database Data from a Class of Software Errors
Increasingly, for extensibility and performance, specialpurpose application code is being integrated with database system code. Such application code has direct access to database...
Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abra...
VLSID
2005
IEEE
131views VLSI» more  VLSID 2005»
14 years 8 months ago
Efficient Space/Time Compression to Reduce Test Data Volume and Testing Time for IP Cores
Abstract-- We present two-dimensional (space/time) compression techniques that reduce test data volume and test application time for scan testing of intellectual property (IP) core...
Lei Li, Krishnendu Chakrabarty, Seiji Kajihara, Sh...
CADE
2007
Springer
14 years 8 months ago
Symbolic Fault Injection
Fault tolerance mechanisms are a key ingredient of dependable systems. In particular, software-implemented hardware fault tolerance (SIHFT) is gaining in popularity, because of its...
Daniel Larsson, Reiner Hähnle
PERCOM
2006
ACM
14 years 7 months ago
Ordering Management Actions in Pervasive Systems using Specification-enhanced Policies
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where ad...
Chetan Shiva Shankar, Roy H. Campbell
ASAP
2009
IEEE
141views Hardware» more  ASAP 2009»
14 years 5 months ago
Accelerating a Virtual Ecology Model with FPGAs
—This paper describes the acceleration of virtual ecology models using field-programmable gate arrays (FPGAs). Our approach targets models generated by the Virtual Ecology Workb...
Julien Lamoureux, Tony Field, Wayne Luk