Sciweavers

5392 search results - page 1065 / 1079
» Formalization, User Strategy And Interaction Design: Users
Sort
View
133
Voted
CLUSTER
2009
IEEE
15 years 7 months ago
24/7 Characterization of petascale I/O workloads
Abstract--Developing and tuning computational science applications to run on extreme scale systems are increasingly complicated processes. Challenges such as managing memory access...
Philip H. Carns, Robert Latham, Robert B. Ross, Ka...
180
Voted
DEXA
2009
Springer
188views Database» more  DEXA 2009»
15 years 7 months ago
On-the-Fly Integration and Ad Hoc Querying of Life Sciences Databases Using LifeDB
Data intensive applications in Life Sciences extensively use the Hidden Web as a platform for information sharing. Access to these heterogeneous Hidden Web resources is limited thr...
Anupam Bhattacharjee, Aminul Islam, Mohammad Shafk...
153
Voted
GLVLSI
2009
IEEE
158views VLSI» more  GLVLSI 2009»
15 years 7 months ago
Exploration of memory hierarchy configurations for efficient garbage collection on high-performance embedded systems
Modern embedded devices (e.g., PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems include multi...
José Manuel Velasco, David Atienza, Katzali...
128
Voted
ICSE
2000
IEEE-ACM
15 years 7 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
135
Voted
DAIS
1997
15 years 5 months ago
A System for Specifying and Coordinating the Execution of Reliable Distributed Applications
An increasing number of distributed applications are being constructed by composing them out of existing applications. The resulting applications can be very complex in structure,...
Frédéric Ranno, Santosh K. Shrivasta...
« Prev « First page 1065 / 1079 Last » Next »