Sciweavers

18094 search results - page 3530 / 3619
» The Architecture of Secure Systems
Sort
View
FPGA
2000
ACM
141views FPGA» more  FPGA 2000»
15 years 3 months ago
Tolerating operational faults in cluster-based FPGAs
In recent years the application space of reconfigurable devices has grown to include many platforms with a strong need for fault tolerance. While these systems frequently contain ...
Vijay Lakamraju, Russell Tessier
ICSE
2000
IEEE-ACM
15 years 3 months ago
Galileo: a tool built from mass-market applications
We present Galileo, an innovative engineering modeling and analysis tool built using an approach we call packageoriented programming (POP). Galileo represents an ongoing evaluatio...
David Coppit, Kevin J. Sullivan
124
Voted
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
15 years 3 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...
VLDB
1995
ACM
112views Database» more  VLDB 1995»
15 years 3 months ago
OPOSSUM: Desk-Top Schema Management through Customizable Visualization
Several recent trends have changed the usage and users of schemas beyond those of a database administrator’s tool for describing database contents. Distribution of computing pow...
Eben M. Haber, Yannis E. Ioannidis, Miron Livny
BTW
2009
Springer
168views Database» more  BTW 2009»
15 years 2 months ago
Embedded Analytics in Front Office Applications
: Today, decision making by users of front office applications happens without analytical information supporting this process. We propose as solution Embedded Analytics (EA) making...
Martin Oberhofer, Erik Nijkamp
« Prev « First page 3530 / 3619 Last » Next »