Sciweavers

2587 search results - page 504 / 518
» Intrusion Tolerant Systems
Sort
View
ISQED
2007
IEEE
165views Hardware» more  ISQED 2007»
15 years 6 months ago
On-Line Adjustable Buffering for Runtime Power Reduction
We present a novel technique to exploit the power-performance tradeoff. The technique can be used stand-alone or in conjunction with dynamic voltage scaling, the mainstream techn...
Andrew B. Kahng, Sherief Reda, Puneet Sharma
SRDS
2006
IEEE
15 years 5 months ago
MOve: Design of An Application-Malleable Overlay
Peer-to-peer overlays allow distributed applications to work in a wide-area, scalable, and fault-tolerant manner. However, most structured and unstructured overlays present in lit...
Sébastien Monnet, Ramsés Morales, Ga...
HIKM
2006
ACM
15 years 5 months ago
Epoch: an ontological framework to support clinical trials management
The increasing complexity of clinical trials has generated an enormous requirement for knowledge and information specification at all stages of the trials, including planning, doc...
Ravi D. Shankar, Susana B. Martins, Martin J. O'Co...
PLDI
2006
ACM
15 years 5 months ago
DieHard: probabilistic memory safety for unsafe languages
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling pointers, and reads of uninitialized data. Such errors ...
Emery D. Berger, Benjamin G. Zorn
INFOCOM
2005
IEEE
15 years 5 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...