Sciweavers

3121 search results - page 600 / 625
» Information Survivability Control Systems
Sort
View
ISCA
2006
IEEE
133views Hardware» more  ISCA 2006»
15 years 3 months ago
TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Qing Yang, Weijun Xiao, Jin Ren
ACMACE
2006
ACM
15 years 3 months ago
Sketching-out virtual humans: from 2D storyboarding to immediate 3D character animation
Virtual beings are playing a remarkable role in today’s public entertainment, while ordinary users are still treated as audiences due to the lack of appropriate expertise, equip...
Chen Mao, Sheng Feng Qin, David K. Wright
MSR
2006
ACM
15 years 3 months ago
TA-RE: an exchange language for mining software repositories
Software repositories have been getting a lot of attention from researchers in recent years. In order to analyze software repositories, it is necessary to first extract raw data f...
Sunghun Kim, Thomas Zimmermann, Miryung Kim, Ahmed...
84
Voted
SASN
2006
ACM
15 years 3 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia
VEE
2005
ACM
199views Virtualization» more  VEE 2005»
15 years 3 months ago
Escape analysis in the context of dynamic compilation and deoptimization
In object-oriented programming languages, an object is said to escape the method or thread in which it was created if it can also be accessed by other methods or threads. Knowing ...
Thomas Kotzmann, Hanspeter Mössenböck