Sciweavers

3095 search results - page 462 / 619
» Ubiquitous presence systems
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
CDC
2008
IEEE
150views Control Systems» more  CDC 2008»
14 years 3 months ago
On frame and orientation localization for relative sensing networks
We develop a novel localization theory for planar networks of nodes that measure each other’s relative position, i.e., we assume that nodes do not have the ability to perform me...
Giulia Piova, Iman Shames, Baris Fidan, Francesco ...
IISWC
2008
IEEE
14 years 3 months ago
Reproducible simulation of multi-threaded workloads for architecture design exploration
As multiprocessors become mainstream, techniques to address efficient simulation of multi-threaded workloads are needed. Multi-threaded simulation presents a new challenge: non-d...
Cristiano Pereira, Harish Patil, Brad Calder
ISQED
2008
IEEE
154views Hardware» more  ISQED 2008»
14 years 3 months ago
Error Protected Data Bus Inversion Using Standard DRAM Components
Off-chip communication consumes a significant part of main memory system power. Existing solutions imply the use of specialized memories or assume error free environments. This i...
Maurizio Skerlj, Paolo Ienne
PIMRC
2008
IEEE
14 years 3 months ago
Performance of VoIP services over 3GPP WCDMA networks
We analyze the performance ofvoice services over 3GPP WCDMA Networks for Release 99 and Release 7 deployments. We show, by using simulations, that the system capacity of Release 7 ...
Ozcan Ozturk, Vinay Chande, Haitong Sun, Mehmet Ya...