Sciweavers

610 search results - page 53 / 122
» Generating Research Websites Using Summarisation Techniques
Sort
View
112
Voted
HOTOS
2003
IEEE
15 years 9 months ago
An Analysis of Compare-by-hash
Recent research has produced a new and perhaps dangerous technique for uniquely identifying blocks that I will call compare-by-hash. Using this technique, we decide whether two bl...
Val Henson
110
Voted
SIGADA
1998
Springer
15 years 7 months ago
Testing Generic Ada Packages with APE
Despite substantial research on methods and tools for testing reusable modules, little help is available for the tester in the eld. Commercial tools for system testing are widely ...
Daniel Hoffman, Jayakrishnan Nair, Paul A. Stroope...
140
Voted
CF
2005
ACM
15 years 5 months ago
Exploiting temporal locality in drowsy cache policies
Technology projections indicate that static power will become a major concern in future generations of high-performance microprocessors. Caches represent a significant percentage ...
Salvador Petit, Julio Sahuquillo, Jose M. Such, Da...
111
Voted
HPCA
2004
IEEE
16 years 4 months ago
Hardware Support for Prescient Instruction Prefetch
This paper proposes and evaluates hardware mechanisms for supporting prescient instruction prefetch--an approach to improving single-threaded application performance by using help...
Tor M. Aamodt, Paul Chow, Per Hammarlund, Hong Wan...
151
Voted
CASCON
2007
1035views Education» more  CASCON 2007»
15 years 5 months ago
An IDE for software development using tabular expressions
We present preliminary work on an IDE for formal software development using tabular expressions as the basis for precise specifications and descriptions of software behaviour. 1 ...
Dennis K. Peters, Mark Lawford, Baltasar Tranc&oac...