Sciweavers

21876 search results - page 4204 / 4376
» Computer game-flow design
Sort
View
129
Voted
EUROSYS
2007
ACM
16 years 21 days ago
Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels
Continuously running systems require kernel software updates applied to them without downtime. Facilitating fast reboots, or delaying an update may not be a suitable solution in m...
Kristis Makris, Kyung Dong Ryu
134
Voted
EUROSYS
2006
ACM
16 years 21 days ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...
119
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 17 days ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
140
Voted
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
16 years 16 days ago
Performance-oriented statistical parameter reduction of parameterized systems via reduced rank regression
Process variations in modern VLSI technologies are growing in both magnitude and dimensionality. To assess performance variability, complex simulation and performance models param...
Zhuo Feng, Peng Li
128
Voted
ICCAD
2004
IEEE
191views Hardware» more  ICCAD 2004»
16 years 16 days ago
Checking consistency of C and Verilog using predicate abstraction and induction
edicate Abstraction and Induction Edmund Clarke Daniel Kroening June 25, 2004 CMU-CS-04-131 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 It is common...
Daniel Kroening, Edmund M. Clarke
« Prev « First page 4204 / 4376 Last » Next »