Sciweavers

3202 search results - page 475 / 641
» Memory access scheduling
Sort
View
113
Voted
PDC
2006
ACM
15 years 8 months ago
Make it so! Jean-Luc Picard, Bart Simpson and the design of e-public services
In this paper, we report on a project applying participatory design methods to include people who have experience of social exclusion (in one form or another) in designing possibl...
Andy Dearden, Angela Lauener, Frances Slack, Chris...
138
Voted
LAWEB
2005
IEEE
15 years 8 months ago
Devices Descriptions for Context-Based Content Adaptation
Nowadays, networks can be accessed by multiple devices with different characteristics. Some of these characteristics such as low processing power and memory capacity restrict the ...
Robson Eisinger, Marcelo G. Manzato, Rudinei Goula...
PDP
2005
IEEE
15 years 8 months ago
FOBr: A Version-Based Recovery Protocol For Replicated Databases
Within the field of databases that are deployed in distributed environments there is a need to guarantee consistency among replicas and availability among nodes despite of networ...
Francisco Castro-Company, Luis Irún-Briz, F...
EUROPAR
2005
Springer
15 years 8 months ago
Event-Based Measurement and Analysis of One-Sided Communication
Abstract. To analyze the correctness and the performance of a program, information about the dynamic behavior of all participating processes is needed. The dynamic behavior can be ...
Marc-André Hermanns, Bernd Mohr, Felix Wolf
111
Voted
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
15 years 8 months ago
Performance analysis of BSTs in system software
Binary search tree (BST) based data structures, such as AVL trees, red-black trees, and splay trees, are often used in system software, such as operating system kernels. Choosing ...
Ben Pfaff