Sciweavers

42738 search results - page 8107 / 8548
» Search Computing Systems
Sort
View
TOPLAS
2010
93views more  TOPLAS 2010»
15 years 3 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
VR
2010
IEEE
167views Virtual Reality» more  VR 2010»
15 years 3 months ago
Dynamic control of multiple focal-plane projections for eliminating defocus and occlusion
This paper presents a novel dynamic control of multiple focal-plane projections. Our approach multiplexes the projectors’ focal-planes so that all the displayed images are focus...
Momoyo Nagase, Daisuke Iwai, Kosuke Sato
161
Voted
VTC
2010
IEEE
125views Communications» more  VTC 2010»
15 years 3 months ago
Single-Carrier Hybrid ARQ Using Joint Transmit/Receive MMSE-FDE
—In the next generation high-speed wireless packet access systems, hybrid automatic repeat request (HARQ) is necessary to achieve higher throughput performance. An HARQ with Chas...
Kazuki Takeda, Fumiyuki Adachi
ACSAC
2010
IEEE
15 years 3 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
ATS
2010
IEEE
229views Hardware» more  ATS 2010»
15 years 3 months ago
Variation-Aware Fault Modeling
Abstract--To achieve a high product quality for nano-scale systems both realistic defect mechanisms and process variations must be taken into account. While existing approaches for...
Fabian Hopsch, Bernd Becker, Sybille Hellebrand, I...
« Prev « First page 8107 / 8548 Last » Next »