Sciweavers

1636 search results - page 289 / 328
» Detecting similar software applications
Sort
View
DAC
2005
ACM
16 years 2 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
CHI
2004
ACM
16 years 2 months ago
Single-handed interaction techniques for multiple pressure-sensitive strips
We present a set of interaction techniques that make novel use of a small pressure-sensitive pad to allow one-handed direct control of a large number of parameters. The surface of...
Gábor Blaskó, Steven Feiner
WWW
2010
ACM
15 years 9 months ago
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with on a daily basis almost always live near us. As people spend more time online, data re...
Lars Backstrom, Eric Sun, Cameron Marlow
EUROSEC
2009
ACM
15 years 8 months ago
WISDOM: security-aware fibres
The network is becoming faster day by day. High-speed links, of many Gbps, are considered as commodity technology empowering the Internet. On the other hand, Moore’s law still a...
Elias Athanasopoulos, Antonis Krithinakis, Georgio...
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
15 years 8 months ago
System-level hardware-based protection of memories against soft-errors
We present a hardware-based approach to improve the resilience of a computer system against the errors occurred in the main memory with the help of error detecting and correcting ...
Valentin Gherman, Samuel Evain, Mickael Cartron, N...