Sciweavers

50 search results - page 4 / 10
» dsn 2008
Sort
View
DSN
2008
IEEE
13 years 7 months ago
An accurate flip-flop selection technique for reducing logic SER
The combination of continued technology scaling and increased on-chip transistor densities has made vulnerability to radiation induced soft errors a significant design concern. In...
Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja
CBMS
2008
IEEE
13 years 11 months ago
CBIR of Spine X-Ray Images on Inter-Vertebral Disc Space and Shape Profiles
There is very limited research published in the literature that applies content-based image retrieval (CBIR) techniques to retrieval of digitized spine X-ray images using a combin...
Yuchou Chang, Sameer Antani, Dah-Jye Lee, Kent Gle...
DSN
2008
IEEE
13 years 7 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
DSN
2008
IEEE
13 years 11 months ago
Hot-spot prediction and alleviation in distributed stream processing applications
Many emerging distributed applications require the realtime processing of large amounts of data that are being updated continuously. Distributed stream processing systems offer a ...
Thomas Repantis, Vana Kalogeraki
DSN
2008
IEEE
13 years 11 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou