Sciweavers

2255 search results - page 394 / 451
» High Assurance Software Systems
Sort
View
116
Voted
HPCA
2005
IEEE
16 years 1 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
PDP
2010
IEEE
15 years 7 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...
98
Voted
ICDCN
2010
Springer
15 years 7 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee
107
Voted
AVSS
2009
IEEE
15 years 7 months ago
Cost-Effective Solution to Synchronized Audio-Visual Capture Using Multiple Sensors
Abstract—Applications such as surveillance and human motion capture require high-bandwidth recording from multiple cameras. Furthermore, the recent increase in research on sensor...
Jeroen Lichtenauer, Michel François Valstar...
78
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Development Framework for Implementing FPGA-Based Cognitive Network Nodes
—This paper identifies important features a cognitive radio framework should provide, namely a virtual architecture ware abstraction, an adaptive run-time system for managing co...
Jorg Lotze, Suhaib A. Fahmy, Juanjo Noguera, Baris...