Sciweavers

226 search results - page 37 / 46
» Special Issue on Information Explosion
Sort
View
IEEEPACT
2006
IEEE
14 years 23 days ago
Overlapping dependent loads with addressless preload
Modern out-of-order processors with non-blocking caches exploit Memory-Level Parallelism (MLP) by overlapping cache misses in a wide instruction window. The exploitation of MLP, h...
Zhen Yang, Xudong Shi, Feiqi Su, Jih-Kwon Peir
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
14 years 13 hour ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
COMPUTER
2002
91views more  COMPUTER 2002»
13 years 6 months ago
Representative Democracy and the Profession
the term refers in an abstract way to a process or institution under which government openly solicits, preserves, and fosters information about its citizens' interests. At the...
W. Neville Holmes
POPL
2012
ACM
12 years 2 months ago
Static and user-extensible proof checking
Despite recent successes, large-scale proof development within proof assistants remains an arcane art that is extremely timeconsuming. We argue that this can be attributed to two ...
Antonis Stampoulis, Zhong Shao
HICSS
2002
IEEE
154views Biometrics» more  HICSS 2002»
13 years 11 months ago
Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems
Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
Kweku-Muata Bryson, William E. Sullivan