Sciweavers

385 search results - page 5 / 77
» Comparing Usage Performance on Mobile Applications
Sort
View
HPCA
2006
IEEE
14 years 7 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
CC
2009
Springer
14 years 4 hour ago
Scheduling Tasks to Maximize Usage of Aggregate Variables in Place
Single-assignment languages with copy semantics have a very simple and approachable programming model. A na¨ıve implementation of the copy semantics that copies the result of eve...
Samah Abu-Mahmeed, Cheryl McCosh, Zoran Budimlic, ...
GLOBECOM
2009
IEEE
13 years 11 months ago
Stochastic Properties and Application of City Section Mobility Model
Abstract--Node mobility has a direct impact on the performance evaluation of various network mobility protocols. Unfortunately, most of the analysis on mobility protocols used Rand...
Md. Shohrab Hossain, Mohammed Atiquzzaman
ISCA
2012
IEEE
262views Hardware» more  ISCA 2012»
11 years 9 months ago
Boosting mobile GPU performance with a decoupled access/execute fragment processor
Smartphones represent one of the fastest growing markets, providing significant hardware/software improvements every few months. However, supporting these capabilities reduces the...
Jose-Maria Arnau, Joan-Manuel Parcerisa, Polychron...
ICDCS
2002
IEEE
14 years 9 days ago
Balancing Performance, Energy, and Quality in Pervasive Computing
We describe Spectra, a remote execution system for batterypowered clients used in pervasive computing. Spectra enables applications to combine the mobility of small devices with t...
Jason Flinn, SoYoung Park, Mahadev Satyanarayanan