Sciweavers

8503 search results - page 1431 / 1701
» Secure Software Architectures
Sort
View
IWCC
1999
IEEE
14 years 3 months ago
Design and Analysis of the Alliance/University of New Mexico Roadrunner Linux SMP SuperCluster
This paper will discuss high performance clustering from a series of critical topics: architectural design, system software infrastructure, and programming environment. This will ...
David A. Bader, Arthur B. Maccabe, Jason R. Mastal...
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
14 years 3 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris
LCTRTS
1999
Springer
14 years 3 months ago
Why SpecInt95 Should Not Be Used to Benchmark Embedded Systems Tools
The SpecInt95 benchmark suite is often used to evaluate the performance of programming tools, including those used for embedded systems programming. Embedded applications, however...
Jakob Engblom
IPPS
1998
IEEE
14 years 3 months ago
An Enhanced Co-Scheduling Method Using Reduced MS-State Diagrams
Instruction scheduling methods based on the construction of state diagrams (or automata) have been used for architectures involving deeply pipelined function units. However, the s...
Ramaswamy Govindarajan, N. S. S. Narasimha Rao, Er...
HT
1998
ACM
14 years 3 months ago
Link services or link agents?
A general link service for the WWW has been used within an Electronic Libraries’ project. Experience using it shows that as the links become increasingly interesting to the user...
Les Carr, Wendy Hall, Steve Hitchcock
« Prev « First page 1431 / 1701 Last » Next »