Sciweavers

7080 search results - page 1004 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
ISCAPDCS
2004
15 years 6 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
DEBS
2003
ACM
15 years 10 months ago
Information sharing with the Oracle database
Database systems have been designed to manage business critical information and make this information accessible on request to connected clients. There is, however, an ever-increa...
Dieter Gawlick, Shailendra Mishra
DIMACS
1996
15 years 6 months ago
Model Checking and the Mu-calculus
There is a growing recognition of the need to apply formal mathematical methods in the design of \high con dence" computing systems. Such systems operate in safety critical co...
E. Allen Emerson
CODES
2004
IEEE
15 years 8 months ago
A loop accelerator for low power embedded VLIW processors
The high transistor density afforded by modern VLSI processes have enabled the design of embedded processors that use clustered execution units to deliver high levels of performan...
Binu K. Mathew, Al Davis
DAC
2006
ACM
16 years 6 months ago
Games are up for DVFS
Graphics-intensive computer games are no longer restricted to highperformance desktops, but are also available on a variety of portable devices ranging from notebooks to PDAs and ...
Yan Gu, Samarjit Chakraborty, Wei Tsang Ooi
« Prev « First page 1004 / 1416 Last » Next »