Sciweavers

467 search results - page 53 / 94
» Program fields for continuous software
Sort
View
CASES
2009
ACM
15 years 2 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
RV
2010
Springer
104views Hardware» more  RV 2010»
14 years 8 months ago
StealthWorks: Emulating Memory Errors
A study of Google’s data center revealed that the incidence of main memory errors is surprisingly high. These errors can lead to application and system corruption, impacting reli...
Musfiq Rahman, Bruce R. Childers, Sangyeun Cho
EXPERT
2006
84views more  EXPERT 2006»
14 years 9 months ago
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
abstraction rules that hide the complexity of systems of components. We've begun this process in the domain of sensor/actuator network applications, observing that in manyappl...
Jacob Beal, Jonathan Bachrach
IEEEPACT
2009
IEEE
14 years 7 months ago
Region Based Structure Layout Optimization by Selective Data Copying
As the gap between processor and memory continues to grow, memory performance becomes a key performance bottleneck for many applications. Compilers therefore increasingly seek to m...
Sandya S. Mannarswamy, Ramaswamy Govindarajan, Ris...
SIGUCCS
2006
ACM
15 years 3 months ago
Bridging the student support gap
In recent years, the use of a computer has become a requirement for success in a collegiate environment, and the demand for mobile computing has sharply increased. In response to ...
Gerald Bailey, Jamie Piperberg, Bud Hiller