Sciweavers

1376 search results - page 240 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
IEPOL
2010
102views more  IEPOL 2010»
14 years 8 months ago
An antitrust analysis of the case for wireless network neutrality
The ongoing debate about possible implementation of regulatory rules requiring “network neutrality” for wireless telecommunications services is inherently about whether to imp...
Gregory L. Rosston, Michael D. Topper
DAC
2007
ACM
15 years 10 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
MICRO
2009
IEEE
128views Hardware» more  MICRO 2009»
15 years 4 months ago
mSWAT: low-cost hardware fault detection and diagnosis for multicore systems
Continued technology scaling is resulting in systems with billions of devices. Unfortunately, these devices are prone to failures from various sources, resulting in even commodity...
Siva Kumar Sastry Hari, Man-Lap Li, Pradeep Ramach...
HUC
2010
Springer
14 years 7 months ago
A holistic multipurpose life-log framework
Life-log systems have a wide range of usages from memory augmentation to health monitoring. Recent advances in pervasive devices and sensor networks enable us to create tools that...
Reza Rawassizadeh
SIAMAM
2011
14 years 4 months ago
Modeling and Design Optimization of a Resonant Optothermoacoustic Trace Gas Sensor
Trace gas sensors that are compact and portable are being deployed for use in a variety of applications including disease diagnosis via breath analysis, monitoring of atmospheric p...
Noemi Petra, John Zweck, Susan E. Minkoff, Anatoli...