Sciweavers

43264 search results - page 8361 / 8653
» Comparing models of computation
Sort
View
ISCA
2007
IEEE
130views Hardware» more  ISCA 2007»
15 years 5 months ago
Dynamic prediction of architectural vulnerability from microarchitectural state
Transient faults due to particle strikes are a key challenge in microprocessor design. Driven by exponentially increasing transistor counts, per-chip faults are a growing burden. ...
Kristen R. Walcott, Greg Humphreys, Sudhanva Gurum...
LCN
2007
IEEE
15 years 5 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
MICRO
2007
IEEE
168views Hardware» more  MICRO 2007»
15 years 5 months ago
Global Multi-Threaded Instruction Scheduling
Recently, the microprocessor industry has moved toward chip multiprocessor (CMP) designs as a means of utilizing the increasing transistor counts in the face of physical and micro...
Guilherme Ottoni, David I. August
TPHOL
2007
IEEE
15 years 5 months ago
Verifying Nonlinear Real Formulas Via Sums of Squares
Techniques based on sums of squares appear promising as a general approach to the universal theory of reals with addition and multiplication, i.e. verifying Boolean combinations of...
John Harrison
AB
2007
Springer
15 years 5 months ago
Algebraic Systems Biology: Theses and Hypotheses
What is systems biology? What can biologists gain from an attempt to algebraize the questions in systems biology? Starting with plausible biological theses, can one algebraically m...
Bud Mishra
« Prev « First page 8361 / 8653 Last » Next »