Sciweavers

8953 search results - page 1633 / 1791
» Parallel Query Processing
Sort
View
131
Voted
ISORC
2009
IEEE
15 years 9 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega
134
Voted
OOPSLA
2009
Springer
15 years 9 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
MM
2009
ACM
196views Multimedia» more  MM 2009»
15 years 9 months ago
Mirror world navigation for mobile users based on augmented reality
Finding a destination in unfamiliar environments of complex office building or shopping mall has been always bothering us in daily life. Fine-scale directional guidance, a combina...
Patricia P. Wang, Tao Wang, Dayong Ding, Yimin Zha...
AINA
2008
IEEE
15 years 9 months ago
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System
—Network Intrusion Detection System (NIDS) is a system developed for identifying attacks by using a set of rules. NIDS is an efficient way to provide the security protection for ...
Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung
115
Voted
ASAP
2008
IEEE
142views Hardware» more  ASAP 2008»
15 years 9 months ago
Managing multi-core soft-error reliability through utility-driven cross domain optimization
As semiconductor processing technology continues to scale down, managing reliability becomes an increasingly difficult challenge in high-performance microprocessor design. Transie...
Wangyuan Zhang, Tao Li
« Prev « First page 1633 / 1791 Last » Next »