Sciweavers

4330 search results - page 859 / 866
» Analyzing security architectures
Sort
View
SIGMETRICS
2008
ACM
13 years 6 months ago
Ironmodel: robust performance models in the wild
Traditional performance models are too brittle to be relied on for continuous capacity planning and performance debugging in many computer systems. Simply put, a brittle model is ...
Eno Thereska, Gregory R. Ganger
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
13 years 6 months ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...
TC
2008
13 years 6 months ago
Hardware Implementation Trade-Offs of Polynomial Approximations and Interpolations
This paper examines the hardware implementation trade-offs when evaluating functions via piecewise polynomial approximations and interpolations for precisions of up to 24 bits. In ...
Dong-U Lee, Ray C. C. Cheung, Wayne Luk, John D. V...
TECS
2008
122views more  TECS 2008»
13 years 6 months ago
Quantitative analysis of the speed/accuracy trade-off in transaction level modeling
tion. Transaction Level Modeling (TLM) has been proposed to abstract communication for highspeed system simulation and rapid design space exploration. Although being widely accepte...
Gunar Schirner, Rainer Dömer
BIOINFORMATICS
2005
96views more  BIOINFORMATICS 2005»
13 years 6 months ago
BioLingua: a programmable knowledge environment for biologists
BioLingua is an interactive, web-based programming environment that enables biologists to analyze biological systems by combining knowledge and data through direct end-user progra...
J. P. Massar, Michael Travers, Jeff Elhai, Jeff Sh...