Sciweavers

1791 search results - page 191 / 359
» Behavioral Operations
Sort
View
121
Voted
DSN
2008
IEEE
15 years 10 months ago
Improving dependability of network configuration through policy classification
As a network evolves over time, multiple operators modify its configuration, without fully considering what has previously been done. Similar policies are defined more than once, ...
Sihyung Lee, Tina Wong, Hyong S. Kim
ICRA
2008
IEEE
194views Robotics» more  ICRA 2008»
15 years 10 months ago
A new variable stiffness design: Matching requirements of the next robot generation
— Facing new tasks, the conventional rigid design of robotic joints has come to its limits. Operating in unknown environments current robots are prone to failure when hitting unf...
Sebastian Wolf, Gerd Hirzinger
MICRO
2008
IEEE
111views Hardware» more  MICRO 2008»
15 years 10 months ago
Reducing the harmful effects of last-level cache polluters with an OS-level, software-only pollute buffer
It is well recognized that LRU cache-line replacement can be ineffective for applications with large working sets or non-localized memory access patterns. Specifically, in lastle...
Livio Soares, David K. Tam, Michael Stumm
122
Voted
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
VTS
2008
IEEE
104views Hardware» more  VTS 2008»
15 years 10 months ago
Signature Rollback - A Technique for Testing Robust Circuits
Dealing with static and dynamic parameter variations has become a major challenge for design and test. To avoid unnecessary yield loss and to ensure reliable system operation a ro...
Uranmandakh Amgalan, Christian Hachmann, Sybille H...