Sciweavers

5948 search results - page 991 / 1190
» Computing Robust Counter-Strategies
Sort
View
86
Voted
WISE
2009
Springer
16 years 28 days ago
Facing Tagging Data Scattering
Web2.0 has brought tagging at the forefront of user practises for organizing and locating resources. Unfortunately, these tagging efforts suffer from a main drawback: lack of inter...
Oscar Díaz, Jon Iturrioz, Cristóbal ...
138
Voted
ICCAD
2007
IEEE
153views Hardware» more  ICCAD 2007»
16 years 20 days ago
Checking equivalence of quantum circuits and states
Among the post-CMOS technologies currently under investigation, quantum computing (QC) holds a special place. QC offers not only extremely small size and low power, but also expon...
George F. Viamontes, Igor L. Markov, John P. Hayes
124
Voted
ICCAD
2007
IEEE
131views Hardware» more  ICCAD 2007»
16 years 20 days ago
Low-overhead design technique for calibration of maximum frequency at multiple operating points
— Determination of maximum operating frequencies (Fmax) during manufacturing test at different operating voltages is required to: (a) to ensure that, for a Dynamic Voltage and Fr...
Somnath Paul, Sivasubramaniam Krishnamurthy, Hamid...
133
Voted
SOSP
2007
ACM
16 years 19 days ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
SOSP
2009
ACM
16 years 19 days ago
Upright cluster services
The UpRight library seeks to make Byzantine fault tolerance (BFT) a simple and viable alternative to crash fault tolerance for a range of cluster services. We demonstrate UpRight ...
Allen Clement, Manos Kapritsos, Sangmin Lee, Yang ...