Sciweavers

16160 search results - page 3151 / 3232
» How to approach humans
Sort
View
PLDI
1999
ACM
14 years 12 days ago
Load-Reuse Analysis: Design and Evaluation
Load-reuse analysis finds instructions that repeatedly access the same memory location. This location can be promoted to a register, eliminating redundant loads by reusing the re...
Rastislav Bodík, Rajiv Gupta, Mary Lou Soff...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
14 years 12 days ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
SMA
1999
ACM
100views Solid Modeling» more  SMA 1999»
14 years 12 days ago
Matchmaker: manifold BReps for non-manifold r-sets
Many solid modeling construction techniques produce non-manifold r-sets (solids). With each non-manifold model N we can associate a family of manifold solid models that are infini...
Jarek Rossignac, David E. Cardoze
HOTOS
1999
IEEE
14 years 12 days ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
INFOCOM
1999
IEEE
14 years 11 days ago
Enhancing Survivability of Mobile Internet Access Using Mobile IP with Location Registers
The Mobile IP (MIP) protocol for IP version 4 provides continuous Internet connectivity to mobile hosts. However, currently it has some drawbacks in the areas of survivability, per...
Ravi Jain, Thomas Raleigh, Danny Yang, Li-Fung Cha...
« Prev « First page 3151 / 3232 Last » Next »