Sciweavers

5263 search results - page 1014 / 1053
» Optimization with Extremal Dynamics
Sort
View
INFOCOM
2008
IEEE
15 years 5 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
ISCA
2008
IEEE
132views Hardware» more  ISCA 2008»
15 years 5 months ago
Online Estimation of Architectural Vulnerability Factor for Soft Errors
As CMOS technology scales and more transistors are packed on to the same chip, soft error reliability has become an increasingly important design issue for processors. Prior resea...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 5 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
RAM
2008
IEEE
124views Robotics» more  RAM 2008»
15 years 5 months ago
Mechatronics Considerations for Assisting Humans
Mechatronics technologies are now steadily penetrating in our daily lives. We are surrounded by mechatronic products and interact with them in many ways. In particular, mechatroni...
Masayoshi Tomizuka
SECON
2008
IEEE
15 years 5 months ago
DiffQ: Differential Backlog Congestion Control for Wireless Multi-hop Networks
Congestion control in wireless multi-hop networks is challenging because of two reasons. First, broadcast is an inherent feature of wireless networks and motivates many creative p...
Ajit Warrier, Sangtae Ha, P. Wason, Injong Rhee, J...
« Prev « First page 1014 / 1053 Last » Next »