Sciweavers

340 search results - page 36 / 68
» On second order operators and quadratic operators
Sort
View
CCR
2004
95views more  CCR 2004»
13 years 8 months ago
A Per-Domain Behavior for circuit emulation in IP networks
Circuit networks are expensive to build, difficult to operate, fragile, and not easily scalable. Many network operators would like to carry circuit traffic as an overlay on top of...
Kathleen M. Nichols, Van Jacobson, Kedarnath Podur...
ICDIM
2007
IEEE
14 years 3 months ago
Control validation of D.E.S systems: Application to remote laboratories
Objectives of Automation courses are knowledge and know-how transfer to students. It is important for learner to control locally or remotely real systems composed of many sensors ...
Pascale Marange, François Gellot, Bernard R...
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Performance analysis of BSTs in system software
Binary search tree (BST) based data structures, such as AVL trees, red-black trees, and splay trees, are often used in system software, such as operating system kernels. Choosing ...
Ben Pfaff
PLDI
1998
ACM
14 years 1 months ago
Improving Performance by Branch Reordering
The conditional branch has long been considered an expensive operation. The relative cost of conditional branches has increased as recently designed machines are now relying on de...
Minghui Yang, Gang-Ryung Uh, David B. Whalley
IJOE
2008
120views more  IJOE 2008»
13 years 8 months ago
Application of the Control Validation to the D.E.S. Teaching
Objectives of Automation courses are knowledge and know-how transfer to students. It is important for learner to control locally or remotely real systems composed of many sensors a...
Pascale Marange, François Gellot, Bernard R...