Sciweavers

1513 search results - page 295 / 303
» Fibonacci Correction Networks
Sort
View
88
Voted
EMSOFT
2006
Springer
15 years 1 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
PLDI
1995
ACM
15 years 1 months ago
Corpus-Based Static Branch Prediction
Correctly predicting the direction that branches will take is increasingly important in today’s wide-issue computer architectures. The name program-based branch prediction is gi...
Brad Calder, Dirk Grunwald, Donald C. Lindsay, Jam...
80
Voted
FAST
2008
14 years 12 months ago
Pergamum: Replacing Tape with Energy Efficient, Reliable, Disk-Based Archival Storage
As the world moves to digital storage for archival purposes, there is an increasing demand for reliable, lowpower, cost-effective, easy-to-maintain storage that can still provide ...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
89
Voted
LISA
2007
14 years 12 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
88
Voted
USS
2008
14 years 12 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger