Sciweavers

318 search results - page 46 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
PR
2008
228views more  PR 2008»
13 years 8 months ago
Accurate integration of multi-view range images using k-means clustering
3D modelling finds a wide range of applications in industry. However, due to the presence of surface scanning noise, accumulative registration errors, and improper data fusion, re...
Hong Zhou, Yonghuai Liu
SIGCSE
2006
ACM
362views Education» more  SIGCSE 2006»
14 years 2 months ago
Chirp on crickets: teaching compilers using an embedded robot controller
Traditionally, the topics of compiler construction and language processing have been taught as an elective course in Computer Science curricula. As such, students may graduate wit...
Li Xu, Fred G. Martin
DSN
2007
IEEE
14 years 3 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
MASCOTS
2010
13 years 10 months ago
PAC: Pattern-driven Application Consolidation for Efficient Cloud Computing
To reduce cloud system resource cost, application consolidation is a must. In this paper, we present a novel patterndriven application consolidation (PAC) system to achieve efficie...
Zhenhuan Gong, Xiaohui Gu
IWMM
2000
Springer
113views Hardware» more  IWMM 2000»
14 years 7 days ago
On the Effectiveness of GC in Java
We study the effectiveness of garbage collection (GC) algorithms by measuring the time difference between the actual collection time of an object and the potential earliest collec...
Ran Shaham, Elliot K. Kolodner, Shmuel Sagiv