Sciweavers

1956 search results - page 348 / 392
» A Critical View of Context
Sort
View
ASPLOS
2006
ACM
15 years 1 months ago
SlicK: slice-based locality exploitation for efficient redundant multithreading
Transient faults are expected a be a major design consideration in future microprocessors. Recent proposals for transient fault detection in processor cores have revolved around t...
Angshuman Parashar, Anand Sivasubramaniam, Sudhanv...
CBSE
2006
Springer
15 years 1 months ago
Generic Component Lookup
The possibilities currently offered to conduct business at an electronic level are immense. Service providers offer access to their attendances through components placed on the Int...
Till G. Bay, Patrick Th. Eugster, Manuel Oriol
CC
2006
Springer
125views System Software» more  CC 2006»
15 years 1 months ago
Path-Based Reuse Distance Analysis
Abstract. Profiling can effectively analyze program behavior and provide critical information for feedback-directed or dynamic optimizations. Based on memory profiling, reuse dista...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...
CCS
2006
ACM
15 years 1 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
CEAS
2006
Springer
15 years 1 months ago
Fast Uncertainty Sampling for Labeling Large E-mail Corpora
One of the biggest challenges in building effective anti-spam solutions is designing systems to defend against the everevolving bag of tricks spammers use to defeat them. Because ...
Richard Segal, Ted Markowitz, William Arnold