Sciweavers

30240 search results - page 5901 / 6048
» Robust System Design
Sort
View
KBSE
2007
IEEE
15 years 10 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
MICRO
2007
IEEE
150views Hardware» more  MICRO 2007»
15 years 10 months ago
Leveraging 3D Technology for Improved Reliability
Aggressive technology scaling over the years has helped improve processor performance but has caused a reduction in processor reliability. Shrinking transistor sizes and lower sup...
Niti Madan, Rajeev Balasubramonian
MICRO
2007
IEEE
137views Hardware» more  MICRO 2007»
15 years 10 months ago
Implementing Signatures for Transactional Memory
Transactional Memory (TM) systems must track the read and write sets—items read and written during a transaction—to detect conflicts among concurrent transactions. Several TM...
Daniel Sanchez, Luke Yen, Mark D. Hill, Karthikeya...
MSS
2007
IEEE
153views Hardware» more  MSS 2007»
15 years 10 months ago
Hybrid Host/Network Topologies for Massive Storage Clusters
The high demand for large scale storage capacity calls for the availability of massive storage solutions with high performance interconnects. Although cluster file systems are rap...
Asha Andrade, Ungzu Mun, Dong Hwan Chung, Alexande...
ROMAN
2007
IEEE
139views Robotics» more  ROMAN 2007»
15 years 10 months ago
Tele-operation of a Mobile Robot Using a Force Reflection Joystick with a Single Hall Sensor
—Though the final goal of mobile robot navigation is to be autonomous, operators’ intelligent and skillful decisions are necessary when there are many scattered obstacles. Ther...
Soonshin Han, JangMyung Lee
« Prev « First page 5901 / 6048 Last » Next »