Sciweavers

7512 search results - page 1460 / 1503
» Robust Computations with Dynamical Systems
Sort
View
133
Voted
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 10 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
145
Voted
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 10 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
AH
2008
Springer
15 years 10 months ago
Collection Browsing through Automatic Hierarchical Tagging
In order to navigate huge document collections efficiently, tagged hierarchical structures can be used. For users, it is important to correctly interpret tag combinations. In this ...
Korinna Bade, Marcel Hermkes
139
Voted
IEEEPACT
2007
IEEE
15 years 10 months ago
Performance Portable Optimizations for Loops Containing Communication Operations
Effective use of communication networks is critical to the performance and scalability of parallel applications. Partitioned Global Address Space languages like UPC bring the pro...
Costin Iancu, Wei Chen, Katherine A. Yelick
RTAS
2007
IEEE
15 years 10 months ago
An Approach for Real-Time Database Modeling and Performance Management
It is challenging to manage the performance of real-time databases (RTDBs) that are often used in data-intensive real-time applications such as agile manufacturing and target trac...
Jisu Oh, Kyoung-Don Kang
« Prev « First page 1460 / 1503 Last » Next »