Sciweavers

3238 search results - page 211 / 648
» Multi-return function call
Sort
View
ISPAN
2000
IEEE
14 years 18 days ago
Comprehensive Evaluation of an Instruction Reissue Mechanism
In this paper, we evaluate a mechanism to reissue instructions on the mispredicted speculation path. An instruction which is once dispatched to a functional unit during mispredict...
Toshinori Sato, Itsujiro Arita
VTS
2000
IEEE
95views Hardware» more  VTS 2000»
14 years 17 days ago
Word Voter: A New Voter Design for Triple Modular Redundant Systems
Redundancy techniques are commonly used to design dependable systems to ensure high reliability, availability and data integrity. Triple Modular Redundancy (TMR) is a widely used ...
Subhasish Mitra, Edward J. McCluskey
STOC
2000
ACM
112views Algorithms» more  STOC 2000»
14 years 17 days ago
A random graph model for massive graphs
We propose a random graph model which is a special case of sparse random graphs with given degree sequences. This model involves only a small number of parameters, called logsize ...
William Aiello, Fan R. K. Chung, Linyuan Lu
AGENTS
2000
Springer
14 years 17 days ago
The user interface as an agent environment
Theoretically motivated planning systems often make assumptions about their environments, in areas such as the predictability of action e ects, static behavior of the environment,...
Robert St. Amant, Luke S. Zettlemoyer
ASIACRYPT
2000
Springer
14 years 17 days ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare