Sciweavers

2913 search results - page 416 / 583
» How Much to Copy
Sort
View
HICSS
1994
IEEE
152views Biometrics» more  HICSS 1994»
14 years 1 months ago
Simple COMA Node Implementations
Shared memory architectures often have caches to reduce the number of slow remote memory accesses. The largest possible caches exist in shared memory architectures called Cache-On...
Erik Hagersten, Ashley Saulsbury, Anders Landin
ISN
1994
Springer
136views Communications» more  ISN 1994»
14 years 1 months ago
High-Level Access APIs in the OSIMIS TMN Platform: Harnessing and Hiding
There is a common unjustified belief that OSI management technology, despite being very powerful, is difficult to implement because of the complexity of the underlying service/prot...
George Pavlou, Thurain Tin, Andy Carr
ACMACE
2007
ACM
14 years 1 months ago
Understanding social interaction in world of warcraft
Research has argued that social interaction is a primary driving force for gamers to continue to play Massive Multiple Online Role Playing Games (MMORPGs). However, one recent stu...
Vivian Hsueh-hua Chen, Henry Been-Lirn Duh
AICCSA
2007
IEEE
99views Hardware» more  AICCSA 2007»
14 years 1 months ago
An Efficient Processor Allocation Strategy that Maintains a High Degree of Contiguity among Processors in 2D Mesh Connected Mult
Two strategies are used for the allocation of jobs to processors connected by mesh topologies: contiguous allocation and non-contiguous allocation. In noncontiguous allocation, a ...
Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ab...
APNOMS
2007
Springer
14 years 1 months ago
OMA DM Based Remote Software Debugging of Mobile Devices
The mobile devices have gained much functionality and intelligence with the growth of network technologies, the abundance of network resources, and the increase of various services...
Joon-Myung Kang, Hong-Taek Ju, Mi-Jung Choi, James...