Sciweavers

5333 search results - page 439 / 1067
» Optimizing Computer System Configurations
Sort
View
DAC
2012
ACM
13 years 7 months ago
Towards fault-tolerant embedded systems with imperfect fault detection
Many state-of-the-art approaches on fault-tolerant system design make the simplifying assumption that all faults are detected within a certain time interval. However, based on a d...
Jia Huang, Kai Huang, Andreas Raabe, Christian Buc...
DFN
2003
15 years 6 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
GI
2009
Springer
15 years 8 months ago
Improving Usability of Integrated Emergency Response Systems: The SoKNOS Approach
: Implementing systems for emergency response poses various challenges. Information from various sources and systems needs to be integrated, processed, aggregated, and visualized i...
Heiko Paulheim, Sebastian Döweling, Karen H. ...
CSCW
2011
ACM
14 years 11 months ago
Scheduling in variable-core collaborative systems
The performance of a collaborative system depends on how two mandatory collaborative tasks, processing and transmission of user commands, are scheduled. We have developed multiple...
Sasa Junuzovic, Prasun Dewan
ISCA
2012
IEEE
302views Hardware» more  ISCA 2012»
13 years 7 months ago
Scale-out processors
The emergence of global-scale online services has galvanized scale-out software, characterized by splitting vast datasets and massive computation across many independent servers. ...
Pejman Lotfi-Kamran, Boris Grot, Michael Ferdman, ...