Sciweavers

2752 search results - page 278 / 551
» Application performance in the QLinux multimedia operating s...
Sort
View
IPSN
2007
Springer
15 years 5 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
SMA
2005
ACM
239views Solid Modeling» more  SMA 2005»
15 years 5 months ago
Bender: a virtual ribbon for deforming 3D shapes in biomedical and styling applications
In contrast to machined mechanical parts, the 3D shapes encountered in biomedical or styling applications contain many tubular parts, protrusions, engravings, embossings, folds, a...
Ignacio Llamas, Alexander Powell, Jarek Rossignac,...
SI3D
1999
ACM
15 years 3 months ago
Applications of pixel textures in visualization and realistic image synthesis
With fast 3D graphics becoming more and more available even on low end platforms, the focus in developing new graphics hardware is beginning to shift towards higher quality render...
Wolfgang Heidrich, Rüdiger Westermann, Hans-P...
ASPLOS
2009
ACM
16 years 3 days ago
Mixed-mode multicore reliability
Future processors are expected to observe increasing rates of hardware faults. Using Dual-Modular Redundancy (DMR), two cores of a multicore can be loosely coupled to redundantly ...
Philip M. Wells, Koushik Chakraborty, Gurindar S. ...
CCS
2010
ACM
14 years 11 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...