Sciweavers

2500 search results - page 369 / 500
» Specifying Behavior in C
Sort
View
104
Voted
STORAGESS
2006
ACM
15 years 9 months ago
Limiting trust in the storage stack
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...
134
Voted
DATE
2005
IEEE
133views Hardware» more  DATE 2005»
15 years 9 months ago
Locality-Aware Process Scheduling for Embedded MPSoCs
Utilizing on-chip caches in embedded multiprocessorsystem-on-a-chip (MPSoC) based systems is critical from both performance and power perspectives. While most of the prior work th...
Mahmut T. Kandemir, Guilin Chen
129
Voted
HICSS
2005
IEEE
91views Biometrics» more  HICSS 2005»
15 years 9 months ago
Size Does Matter in Computer Collaboration: Heterogeneous Platform Effects on Human-Human Interaction
Because today’s workforce is highly mobile, small wireless devices are being used to support mobile work collaboration. However, do computer platform differences affect such col...
Marilyn Tremaine, Aleksandra Sarcevic, Dezhi Wu, M...
112
Voted
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
15 years 9 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...
144
Voted
ITCC
2005
IEEE
15 years 9 months ago
Performance Analysis of Mobile Backbone Topology Synthesis Algorithm for Wireless Ad Hoc Networks
In this paper, we present a scalable fully distributed version of a Mobile Backbone Network Topology Synthesis Algorithm (MBN-TSA) for constructing and maintaining a dynamic backb...
Laura Huei-jiun Ju, Izhak Rubin