Sciweavers

5548 search results - page 1011 / 1110
» Programming a Distributed System Using Shared Objects
Sort
View
HUC
2010
Springer
15 years 5 months ago
Ubiquitous computing for sustainable energy (UCSE2010)
Providing sustainable energy is one of the fundamental challenges for mankind. With energy usage being a part of everyday activities and with the increasingly diversity of energy ...
Albrecht Schmidt, Adrian Friday, Hans-Werner Gelle...
PDP
2011
IEEE
14 years 8 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...
CCS
2009
ACM
16 years 5 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 11 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...
DICS
2006
15 years 6 months ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer
« Prev « First page 1011 / 1110 Last » Next »