Sciweavers

4037 search results - page 360 / 808
» Routing without ordering
Sort
View
101
Voted
DSN
2008
IEEE
15 years 10 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
106
Voted
ICRA
2008
IEEE
179views Robotics» more  ICRA 2008»
15 years 10 months ago
How can human motion prediction increase transparency?
—A major issue in the field of human-robot interaction for assistance to manipulation is transparency. This basic feature qualifies the capacity for a robot to follow human mov...
Nathanaël Jarrassé, Jamie Paik, Vivian...
135
Voted
ICDE
2007
IEEE
119views Database» more  ICDE 2007»
15 years 9 months ago
Fast and Reliable Stream Processing over Wide Area Networks
We present a replication-based approach that enables both fast and reliable stream processing over wide area networks. Our approach replicates stream processing operators in a man...
Jeong-Hyon Hwang, Ugur Çetintemel, Stanley ...
111
Voted
IEEEPACT
2007
IEEE
15 years 9 months ago
Paceline: Improving Single-Thread Performance in Nanoscale CMPs through Core Overclocking
Under current worst-case design practices, manufacturers specify conservative values for processor frequencies in order to guarantee correctness. To recover some of the lost perfo...
Brian Greskamp, Josep Torrellas
ISPASS
2007
IEEE
15 years 9 months ago
Reverse State Reconstruction for Sampled Microarchitectural Simulation
For simulation, a tradeoff exists between speed and accuracy. The more instructions simulated from the workload, the more accurate the results — but at a higher cost. To reduce ...
Paul D. Bryan, Michel C. Rosier, Thomas M. Conte