Sciweavers

7596 search results - page 1412 / 1520
» Challenges in forensic computing
Sort
View
IEEEPACT
2009
IEEE
15 years 10 months ago
StealthTest: Low Overhead Online Software Testing Using Transactional Memory
—Software testing is hard. The emergence of multicore architectures and the proliferation of bugprone multithreaded software makes testing even harder. To this end, researchers h...
Jayaram Bobba, Weiwei Xiong, Luke Yen, Mark D. Hil...
INFOCOM
2009
IEEE
15 years 10 months ago
apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates
—The Internet has become a cost-effective vehicle for software development and release, particular in the free software community. Given the free nature of this software, there a...
Cameron Dale, Jiangchuan Liu
IROS
2009
IEEE
138views Robotics» more  IROS 2009»
15 years 10 months ago
Using eigenposes for lossless periodic human motion imitation
— Programming a humanoid robot to perform an action that takes the robot’s complex dynamics into account is a challenging problem. Traditional approaches typically require high...
Rawichote Chalodhorn, Rajesh P. N. Rao
ISCA
2009
IEEE
136views Hardware» more  ISCA 2009»
15 years 10 months ago
ECMon: exposing cache events for monitoring
The advent of multicores has introduced new challenges for programmers to provide increased performance and software reliability. There has been significant interest in technique...
Vijay Nagarajan, Rajiv Gupta
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 10 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
« Prev « First page 1412 / 1520 Last » Next »