Sciweavers

232 search results - page 34 / 47
» An Efficient Implementation of Multiple Return Values in Sch...
Sort
View
ICS
2010
Tsinghua U.
13 years 11 months ago
InterferenceRemoval: removing interference of disk access for MPI programs through data replication
As the number of I/O-intensive MPI programs becomes increasingly large, many efforts have been made to improve I/O performance, on both software and architecture sides. On the sof...
Xuechen Zhang, Song Jiang
MICRO
2003
IEEE
143views Hardware» more  MICRO 2003»
14 years 1 months ago
VSV: L2-Miss-Driven Variable Supply-Voltage Scaling for Low Power
Energy-efficient processor design is becoming more and more important with technology scaling and with high performance requirements. Supply-voltage scaling is an efficient way to...
Hai Li, Chen-Yong Cher, T. N. Vijaykumar, Kaushik ...
WECWIS
2003
IEEE
106views ECommerce» more  WECWIS 2003»
14 years 1 months ago
Degree of Satisfaction in Agent Negotiation
Agent negotiation over multiple issues is often seen as the process of searching for a solution in a complex and large space. Depending on the negotiation mechanism such search sp...
Kuo-Ming Chao, Muhammad Younas, Rachid Anane, Chen...
ACSAC
1999
IEEE
14 years 1 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
MOBICOM
2010
ACM
13 years 8 months ago
Side channel: bits over interference
Interference is a critical issue in wireless communications. In a typical multiple-user environment, different users may severely interfere with each other. Coordination among use...
Kaishun Wu, Haoyu Tan, Yunhuai Liu, Jin Zhang, Qia...