Sciweavers

7195 search results - page 1340 / 1439
» On Computing Power
Sort
View
158
Voted
PDP
2011
IEEE
14 years 7 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...
144
Voted
EUROSYS
2011
ACM
14 years 6 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
182
Voted
EUROSYS
2011
ACM
14 years 6 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...
170
Voted
FGR
2011
IEEE
244views Biometrics» more  FGR 2011»
14 years 6 months ago
Emotion representation, analysis and synthesis in continuous space: A survey
— Despite major advances within the affective computing research field, modelling, analysing, interpreting and responding to naturalistic human affective behaviour still remains...
Hatice Gunes, Björn Schuller, Maja Pantic, Ro...
ICS
2011
Tsinghua U.
14 years 6 months ago
Scalable fine-grained call path tracing
Applications must scale well to make efficient use of even medium-scale parallel systems. Because scaling problems are often difficult to diagnose, there is a critical need for sc...
Nathan R. Tallent, John M. Mellor-Crummey, Michael...
« Prev « First page 1340 / 1439 Last » Next »