Semantic Scholar uses AI to extract papers important to this topic.
Increasing numbers of software vulnerabilities are discovered every year whether they are reported publicly or discovered… Expand Due to limited scaling of supply voltage, power density is expected to grow in future technology nodes. This increasing power… Expand This paper empirically studies the determinants of firms’ decision to offshore product development activities (i.e. R&D, product… Expand We present Privacy Scope, a new system that tracks the movement of sensitive user data as it flows through off-the-shelf… Expand In general, standard benchmark suites are critically important for researchers to quantitatively evaluate their new ideas and… Expand Profiling is a key technique for achieving high performance. Call‐path profiling is a refinement of this technique that… Expand This paper presents an architecture that allows multiple isolated commodity operating systems to run concurrently on a… Expand Abstract In contrast to macroscopic tools, life cycle assessment (LCA) starts from the microstructure of an economic system: the… Expand Most research conducted in the evolvable hardware EHW area has been done at the gate level. In order to synthesize larger… Expand This paper reviews an area which has evolved over the past 15 years: experimental analysis of computer system dependability… Expand