Sciweavers

1845 search results - page 191 / 369
» Computing the Angularity Tolerance
Sort
View
129
Voted
RTCSA
2006
IEEE
15 years 9 months ago
Towards an Analysis of Garbage Collection Techniques for Embedded Real-Time Java Systems
From a real-time perspective, the Garbage Collector (GC) introduces unpredictable pauses that are not tolerated by real-time tasks. Real-time collectors eliminate this problem but...
M. Teresa Higuera-Toledano
137
Voted
EH
2005
IEEE
119views Hardware» more  EH 2005»
15 years 9 months ago
Survivability of Embryonic Memories: Analysis and Design Principles
This paper proposes an original approach to the reliability analysis for Embryonics [4], by introducing the accuracy threshold measure, borrowed from fault-tolerant quantum comput...
Lucian Prodan, Mihai Udrescu, Mircea Vladutiu
100
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
Undo for anyone, anywhere, anytime
Computer systems are complex and unforgiving. Users need environments more tolerant of errors, allowing them to correct mistakes and explore alternatives. This is the aim of Joyce...
James O'Brien, Marc Shapiro
110
Voted
IPTPS
2004
Springer
15 years 9 months ago
Peer-to-Peer Authentication with a Distributed Single Sign-On Service
Abstract. CorSSO is a distributed service for authentication in networks. It allows application servers to delegate client identity checking to combinations of authentication serve...
William K. Josephson, Emin Gün Sirer, Fred B....
RSCTC
2004
Springer
148views Fuzzy Logic» more  RSCTC 2004»
15 years 9 months ago
Towards Missing Data Imputation: A Study of Fuzzy K-means Clustering Method
In this paper, we present a missing data imputation method based on one of the most popular techniques in Knowledge Discovery in Databases (KDD), i.e. clustering technique. We comb...
Dan Li, Jitender S. Deogun, William Spaulding, Bil...