Sciweavers

657 search results - page 73 / 132
» Recovering architectural assumptions
Sort
View
ICDE
1999
IEEE
107views Database» more  ICDE 1999»
16 years 1 months ago
Using Codewords to Protect Database Data from a Class of Software Errors
Increasingly, for extensibility and performance, specialpurpose application code is being integrated with database system code. Such application code has direct access to database...
Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abra...
DAC
2009
ACM
16 years 25 days ago
Enabling adaptability through elastic clocks
Power and performance benefits of scaling are lost to worst case margins as uncertainty of device characteristics is increasing. Adaptive techniques can dynamically adjust the mar...
Emre Tuncer, Jordi Cortadella, Luciano Lavagno
DAC
2005
ACM
16 years 24 days ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
ISBI
2008
IEEE
16 years 16 days ago
Detection of multiple pathways in the spinal cord white matter using q-ball imaging
High angular resolution MRI such as q-ball imaging (QBI) allows to recover complex white matter architecture. We applied this technique to an ex vivo spinal cord of one cat using ...
Julien Cohen-Adad, Maxime Descoteaux, Serge Rossig...
ESORICS
2009
Springer
16 years 13 days ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan