Sciweavers

7853 search results - page 1410 / 1571
» Learning from Each Other
Sort
View
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
14 years 3 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
ISESE
2002
IEEE
14 years 3 months ago
Conducting Realistic Experiments in Software Engineering
An important goal of most empirical software engineering research is the transfer of research results to industrial applications. Two important obstacles for this transfer are the...
Dag I. K. Sjøberg, Bente Anda, Erik Arishol...
SIGECOM
2010
ACM
125views ECommerce» more  SIGECOM 2010»
14 years 2 months ago
Information asymmetries in pay-per-bid auctions
Recently, some mainstream e-commerce web sites have begun using “pay-per-bid” auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost...
John W. Byers, Michael Mitzenmacher, Georgios Zerv...
SIGECOM
2010
ACM
154views ECommerce» more  SIGECOM 2010»
14 years 2 months ago
Ranking games that have competitiveness-based strategies
This paper studies —from the perspective of efficient computation— a type of competition that is widespread throughout the plant and animal kingdoms, higher education, politic...
Leslie Ann Goldberg, Paul W. Goldberg, Piotr Kryst...
ICOIN
2001
Springer
14 years 2 months ago
A Proxy Caching Scheme for Continuous Media Streams on the Internet
The Internet has enabled the dissemination and access of vast amounts of information to be easy. But dramatic increases of the number of users of Internet cause server overload, n...
Eun-Ji Lim, Seong-Ho Park, Hyeon-Ok Hong, Ki-Dong ...
« Prev « First page 1410 / 1571 Last » Next »