Sciweavers

1256 search results - page 195 / 252
» Compositional Memory Systems for Data Intensive Applications
Sort
View
95
Voted
SOSP
2009
ACM
15 years 9 months ago
Surviving sensor network software faults
We describe Neutron, a version of the TinyOS operating system that efficiently recovers from memory safety bugs. Where existing schemes reboot an entire node on an error, Neutron...
Yang Chen, Omprakash Gnawali, Maria A. Kazandjieva...
IHI
2010
143views Healthcare» more  IHI 2010»
14 years 7 months ago
Mining and monitoring patterns of daily routines for assisted living in real world settings
In this paper we demonstrate a fully automated approach for discovering and monitoring patterns of daily activities. Discovering patterns of daily activities and tracking them can...
Parisa Rashidi, Diane J. Cook
ACSAC
2006
IEEE
15 years 6 months ago
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software
Address space randomization is an emerging and promising method for stopping a broad range of memory corruption attacks. By randomly shifting critical memory regions at process in...
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, ...
PC
2010
196views Management» more  PC 2010»
14 years 11 months ago
Solving path problems on the GPU
We consider the computation of shortest paths on Graphic Processing Units (GPUs). The blocked recursive elimination strategy we use is applicable to a class of algorithms (such as...
Aydin Buluç, John R. Gilbert, Ceren Budak
DEXA
2009
Springer
188views Database» more  DEXA 2009»
15 years 4 months ago
On-the-Fly Integration and Ad Hoc Querying of Life Sciences Databases Using LifeDB
Data intensive applications in Life Sciences extensively use the Hidden Web as a platform for information sharing. Access to these heterogeneous Hidden Web resources is limited thr...
Anupam Bhattacharjee, Aminul Islam, Mohammad Shafk...