Sciweavers

12333 search results - page 2176 / 2467
» System Level Modelling for Hardware Software Systems
Sort
View
HPCA
2005
IEEE
16 years 5 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
CHI
2004
ACM
16 years 5 months ago
Gummi: a bendable computer
Gummi is an interaction technique and device concept based on physical deformation of a handheld device. The device consists of several layers of flexible electronic components, i...
Carsten Schwesig, Ivan Poupyrev, Eijiro Mori
123
Voted
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
15 years 11 months ago
The Role of Social Capital in the Creation of Community Wireless Networks
Community wireless networks (CWNs) offer free or affordable Internet access for the purpose of improving the well-being of the community. Many questions have been raised about the...
Abdelnasser Abdelaal, Hesham H. Ali, Deepak Khazan...
SARA
2009
Springer
15 years 11 months ago
Automated Redesign with the General Redesign Engine
: Given a system design (SD), a key task is to optimize this design to reduce the probability of catastrophic failures. We consider the task of redesigning an SD to minimize the pr...
Alexander Feldman, Gregory M. Provan, Johan de Kle...
IEEEPACT
2008
IEEE
15 years 11 months ago
The PARSEC benchmark suite: characterization and architectural implications
This paper presents and characterizes the Princeton Application Repository for Shared-Memory Computers (PARSEC), a benchmark suite for studies of Chip-Multiprocessors (CMPs). Prev...
Christian Bienia, Sanjeev Kumar, Jaswinder Pal Sin...
« Prev « First page 2176 / 2467 Last » Next »