Sciweavers

463 search results - page 66 / 93
» Discovering communication
Sort
View
CIA
2003
Springer
14 years 19 days ago
Send Fredo off to Do This, Send Fredo off to Do That
Abstract. Fredo is a generic domain-independent broker that creates valueadded information taking into account the preferences specified by its clients. Fredo uses ontology service...
Luís Miguel Botelho, Hugo Mendes, Pedro Fig...
IFIP
2003
Springer
14 years 18 days ago
A Service Discovery Model for Wireless and Mobile Terminals in IPv6
As the mobility and the number of affordable, powerful, and highly portable devices becoming networked increases, so will the amount of networked services offered, managed and disc...
Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harj...
CLUSTER
2002
IEEE
14 years 11 days ago
I/O Analysis and Optimization for an AMR Cosmology Application
In this paper, we investigate the data access patterns and file I/O behaviors of a production cosmology application that uses the adaptive mesh refinement (AMR) technique for it...
Jianwei Li, Wei-keng Liao, Alok N. Choudhary, Vale...
PADL
2001
Springer
13 years 12 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
ISCA
1998
IEEE
107views Hardware» more  ISCA 1998»
13 years 11 months ago
Memory Dependence Prediction Using Store Sets
For maximum performance, an out-of-order processor must issue load instructions as early as possible, while avoiding memory-order violations with prior store instructions that wri...
George Z. Chrysos, Joel S. Emer