Sciweavers

10792 search results - page 2065 / 2159
» An Evaluation of Non-Equijoin Algorithms
Sort
View
AUIC
2006
IEEE
14 years 4 months ago
Patternprogrammer: yet another rule-based programming environment for children
Graphical rewrite rules are often used in programming environments for children. These rules consist of two parts: a left-hand side, which is visually matched in the environment, ...
Tim Wright
CGO
2006
IEEE
14 years 4 months ago
Exhaustive Optimization Phase Order Space Exploration
The phase-ordering problem is a long standing issue for compiler writers. Most optimizing compilers typically have numerous different code-improving phases, many of which can be a...
Prasad Kulkarni, David B. Whalley, Gary S. Tyson, ...
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
14 years 4 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
GLOBECOM
2006
IEEE
14 years 4 months ago
Propagation Channel Characteristics for Peer-to-Peer Multiple Antenna Systems at 300 MHz
This paper presents results from the first double-directional measurements of the Multiple-Input Multiple-Output (MIMO) peer-to-peer radio channel in the 300 MHz frequency range....
Gunnar Eriksson, Fredrik Tufvesson, Andreas F. Mol...
GLOBECOM
2006
IEEE
14 years 4 months ago
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in Wireless Sensor Networks
— Coverage is an important issue related to WSN quality of service. Several centralized/decentralized solutions based on the geometry information of sensors and under the assumpt...
Azzedine Boukerche, Xin Fei, Regina Borges de Arau...
« Prev « First page 2065 / 2159 Last » Next »