Sciweavers

409 search results - page 60 / 82
» Considering Time in Designing Large-Scale Systems for Scient...
Sort
View
CSREAPSC
2006
15 years 3 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
111
Voted
SAC
2009
ACM
15 years 8 months ago
On scheduling soft real-time tasks with lock-free synchronization for embedded devices
In this paper, we consider minimizing the system-level energy consumption through dynamic voltage scaling for embedded devices, while a) allowing concurrent access to shared objec...
Shouwen Lai, Binoy Ravindran, Hyeonjoong Cho
HPCA
2006
IEEE
16 years 2 months ago
BulletProof: a defect-tolerant CMP switch architecture
As silicon technologies move into the nanometer regime, transistor reliability is expected to wane as devices become subject to extreme process variation, particle-induced transie...
Kypros Constantinides, Stephen Plaza, Jason A. Blo...
113
Voted
NOSSDAV
2009
Springer
15 years 8 months ago
Providing statistically guaranteed streaming quality for peer-to-peer live streaming
Most of the literature on peer-to-peer (P2P) live streaming focuses on how to provide best-effort streaming quality by efficiently using the system bandwidth; however, there is n...
Miao Wang, Lisong Xu, Byrav Ramamurthy
RTAS
2008
IEEE
15 years 8 months ago
WCET Analysis for Multi-Core Processors with Shared L2 Instruction Caches
Multi-core chips have been increasingly adopted by microprocessor industry. For real-time systems to safely harness the potential of multi-core computing, designers must be able t...
Jun Yan, Wei Zhang