Sciweavers

5506 search results - page 1080 / 1102
» Visualizing Software Changes
Sort
View
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 3 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
CLOUD
2010
ACM
15 years 3 months ago
Stateful bulk processing for incremental analytics
This work addresses the need for stateful dataflow programs that can rapidly sift through huge, evolving data sets. These data-intensive applications perform complex multi-step c...
Dionysios Logothetis, Christopher Olston, Benjamin...
ACSAC
2002
IEEE
15 years 3 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
72
Voted
HICSS
2002
IEEE
92views Biometrics» more  HICSS 2002»
15 years 3 months ago
Strategic 'Morphing' and the Survivability of E-commerce Firms
Over the past year, the shakeout in the electronic commerce marketplace has redirected the attention of entrepreneurs and investors from the funding hype surrounding Internet star...
Robert J. Kauffman, Bin Wang, Tim Miller
LCTRTS
2010
Springer
15 years 3 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
« Prev « First page 1080 / 1102 Last » Next »