Sciweavers

1264 search results - page 214 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
134
Voted
DAC
2006
ACM
16 years 2 months ago
Systematic temperature sensor allocation and placement for microprocessors
Modern high performance processors employ advanced techniques for thermal management, which rely on accurate readings of on-die thermal sensors. As the importance of thermal effec...
Rajarshi Mukherjee, Seda Ogrenci Memik
OSDI
2008
ACM
16 years 2 months ago
Disk Drive Workload Captured in Logs Collected During the Field Return Incoming Test
Hard disk drives returned back to Seagate undergo the Field Return Incoming Test. During the test, the available logs in disk drives are collected, if possible. These logs contain...
Alma Riska, Erik Riedel
EWSN
2004
Springer
16 years 1 months ago
Lessons from a Sensor Network Expedition
Habitat monitoring is an important driving application for wireless sensor networks (WSNs). Although researchers anticipate some challenges arising in the real-world deployments of...
Robert Szewczyk, Joseph Polastre, Alan M. Mainwari...
AMI
2009
Springer
15 years 8 months ago
I Bet You Look Good on the Wall: Making the Invisible Computer Visible
The design ideal of the invisible computer, prevalent in the vision of ambient intelligence (AmI), has led to a number of interaction challenges. The complex nature of AmI environm...
Jo Vermeulen, Jonathan Slenders, Kris Luyten, Kari...
105
Voted
SSS
2007
Springer
108views Control Systems» more  SSS 2007»
15 years 8 months ago
Robust Stabilizing Leader Election
Abstract. In this paper, we mix two well-known approaches of the fault-tolerance: robustness and stabilization. Robustness is the aptitude of an algorithm to withstand permanent fa...
Carole Delporte-Gallet, Stéphane Devismes, ...