Sciweavers

2125 search results - page 269 / 425
» Points with Type-2 Operations
Sort
View
HPCA
2006
IEEE
16 years 4 months ago
CMP design space exploration subject to physical constraints
This paper explores the multi-dimensional design space for chip multiprocessors, exploring the inter-related variables of core count, pipeline depth, superscalar width, L2 cache s...
Yingmin Li, Benjamin C. Lee, David Brooks, Zhigang...
CHI
2001
ACM
16 years 4 months ago
Doom as an interface for process management
This paper explores a novel interface to a system administration task. Instead of creating an interface de novo for the task, the author modified a popular computer game, Doom, to...
Dennis L. Chao
VLDB
2006
ACM
207views Database» more  VLDB 2006»
16 years 4 months ago
Modeling and querying moving objects in networks
: Moving Objects Databases have become an important research issue in recent years. For and querying moving objects, there exists a comprehensive framework of abstract data types t...
Ralf Hartmut Güting, Victor Teixeira de Almeida, ...
ICSE
2003
IEEE-ACM
16 years 4 months ago
Stemming Architectural Erosion by Coupling Architectural Discovery and Recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Alexander Egyed, Nenad Medvidovic, Paul Grünb...
141
Voted
PERCOM
2005
ACM
16 years 4 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...