Sciweavers

366 search results - page 48 / 74
» Modeling Requirements for Value Configuration Design
Sort
View
MICRO
2006
IEEE
84views Hardware» more  MICRO 2006»
15 years 5 months ago
Reunion: Complexity-Effective Multicore Redundancy
To protect processor logic from soft errors, multicore redundant architectures execute two copies of a program on separate cores of a chip multiprocessor (CMP). Maintaining identi...
Jared C. Smolens, Brian T. Gold, Babak Falsafi, Ja...
HASKELL
2007
ACM
15 years 3 months ago
A lightweight interactive debugger for haskell
This paper describes the design and construction of a Haskell source-level debugger built into the GHCi interactive environment. We have taken a pragmatic approach: the debugger i...
Simon Marlow, José Iborra, Bernard Pope, An...
MSWIM
2005
ACM
15 years 5 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
MSWIM
2009
ACM
15 years 6 months ago
Socially conscious channel selection in 802.11 WLANs for coexistence in a non-cooperative environment
The increasing number of independent IEEE 802.11 WLANs owned and managed by autonomous users has led to increased interference, resulting in performance degradation and unfairness...
Joo Ghee Lim, Chun Tung Chou, Sanjay Jha