Sciweavers

4330 search results - page 764 / 866
» Analyzing security architectures
Sort
View
119
Voted
RTSS
1999
IEEE
15 years 8 months ago
Timing Anomalies in Dynamically Scheduled Microprocessors
Previous timing analysis methods have assumed that the worst-case instruction execution time necessarily corresponds to the worst-case behavior. We show that this assumption is wr...
Thomas Lundqvist, Per Stenström
133
Voted
SSDBM
1999
IEEE
113views Database» more  SSDBM 1999»
15 years 8 months ago
Multidimensional Indexing and Query Coordination for Tertiary Storage Management
In many scientific domains, experimental devices or simulation programs generate large volumes of data. The volumes of data may reach hundreds of terabytes and therefore it is imp...
Arie Shoshani, Luis M. Bernardo, Henrik Nordberg, ...
172
Voted
HPCN
1999
Springer
15 years 8 months ago
Data Intensive Distributed Computing; A Medical Application Example
Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data from around the world, as well as employing large-scale computation. The...
Jason Lee, Brian Tierney, William E. Johnston
110
Voted
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
15 years 8 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris
127
Voted
SIGCOMM
1998
ACM
15 years 8 months ago
Scalable QoS Provision Through Buffer Management
In recent years, a number of link scheduling algorithms have been proposed that greatly improve upon traditional FIFO scheduling in being able to assure rate and delay bounds for ...
Roch Guérin, Sanjay Kamat, Vinod G. J. Peri...