Sciweavers

5493 search results - page 962 / 1099
» Effectively Polynomial Simulations
Sort
View
LCTRTS
2010
Springer
14 years 2 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
FDG
2009
ACM
14 years 2 months ago
Affective game engines: motivation and requirements
The tremendous advances in gaming technologies over the past decade have focused primarily on the physical realism of the game environment and game characters, and the complexity ...
Eva Hudlicka
ICNP
2000
IEEE
14 years 2 months ago
Differentiated Predictive Fair Service for TCP Flows
The majority of the traffic (bytes) flowing over the Internet today have been attributed to the Transmission Control Protocol (TCP). This strong presence of TCP has recently spu...
Ibrahim Matta, Liang Guo
INFOCOM
2000
IEEE
14 years 2 months ago
Multimedia Proxy Caching Mechanism for Quality Adaptive Streaming Applications in the Internet
— The Internet has witnessed a rapid growth in deployment of Web-based streaming applications during recent years. In these applications, server should be able to perform end-to-...
Reza Rejaie, Haobo Yu, Mark Handley, Deborah Estri...
ECAI
2000
Springer
14 years 2 months ago
Autosteve: Automated Electrical Design Analysis
AutoSteve performs automated electrical design based on qualitative simulation and functional abstraction. It is the first commercial product capable of performing these tasks for ...
Chris Price