<--- Back to Details
First PageDocument Content
Technology / Transport / Modeling and simulation / United States Army Tank Automotive Research /  Development and Engineering Center / Warren /  Michigan / Simulation software / Fuel cell / Simulation / United States Army TACOM Life Cycle Management Command / Hybrid electric vehicles / Energy / Green vehicles
Date: 2013-08-06 16:15:56
Technology
Transport
Modeling and simulation
United States Army Tank Automotive Research
Development and Engineering Center
Warren
Michigan
Simulation software
Fuel cell
Simulation
United States Army TACOM Life Cycle Management Command
Hybrid electric vehicles
Energy
Green vehicles

ARC Conference 2002: Sympos...

Add to Reading List

Source URL: arc.engin.umich.edu

Download Document from Source Website

File Size: 212,24 KB

Share Document on Facebook

Similar Documents

Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

DocID: 1xVLP - View Document

Computing / Technology / California / EMC Corporation / VMware / Embedded system / Synopsys / USENIX Annual Technical Conference / Debugging / Intel / Software Guard Extensions / Edouard Bugnion

Baris Kasikci Assistant Professor Electrical Engineering and Computer Science University of Michigan 4820 BBB 2260 Hayward Street

DocID: 1xVL2 - View Document

Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

DocID: 1xVIz - View Document

Computing / Programming language implementation / Parallel computing / Debugging / Optimizing compiler / X86 / Computer engineering

REPT: Reverse Debugging of Failures in Deployed Software Weidong Cui and Xinyang Ge, Microsoft Research Redmond; Baris Kasikci, University of Michigan; Ben Niu, Microsoft Research Redmond; Upamanyu Sharma, University of

DocID: 1xVto - View Document

Computing / Computer architecture / Computer engineering / Computer memory / Computer security / Memory management / Side-channel attacks / Software Guard Extensions / Cold boot attack / C dynamic memory allocation / Sync / Cache

Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves Ofir Weisse Valeria Bertacco Todd Austin University of Michigan oweisse/vale/

DocID: 1xVdO - View Document