Sciweavers

5392 search results - page 1065 / 1079
» Formalization, User Strategy And Interaction Design: Users
Sort
View
CLUSTER
2009
IEEE
14 years 16 days ago
24/7 Characterization of petascale I/O workloads
Abstract--Developing and tuning computational science applications to run on extreme scale systems are increasingly complicated processes. Challenges such as managing memory access...
Philip H. Carns, Robert Latham, Robert B. Ross, Ka...
DEXA
2009
Springer
188views Database» more  DEXA 2009»
14 years 14 days ago
On-the-Fly Integration and Ad Hoc Querying of Life Sciences Databases Using LifeDB
Data intensive applications in Life Sciences extensively use the Hidden Web as a platform for information sharing. Access to these heterogeneous Hidden Web resources is limited thr...
Anupam Bhattacharjee, Aminul Islam, Mohammad Shafk...
GLVLSI
2009
IEEE
158views VLSI» more  GLVLSI 2009»
14 years 14 days ago
Exploration of memory hierarchy configurations for efficient garbage collection on high-performance embedded systems
Modern embedded devices (e.g., PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems include multi...
José Manuel Velasco, David Atienza, Katzali...
ICSE
2000
IEEE-ACM
14 years 6 days ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
DAIS
1997
13 years 10 months ago
A System for Specifying and Coordinating the Execution of Reliable Distributed Applications
An increasing number of distributed applications are being constructed by composing them out of existing applications. The resulting applications can be very complex in structure,...
Frédéric Ranno, Santosh K. Shrivasta...
« Prev « First page 1065 / 1079 Last » Next »