Sciweavers

28244 search results - page 5489 / 5649
» System Design for Flexibility
Sort
View
ISCA
2009
IEEE
150views Hardware» more  ISCA 2009»
15 years 10 months ago
Stream chaining: exploiting multiple levels of correlation in data prefetching
Data prefetching has long been an important technique to amortize the effects of the memory wall, and is likely to remain so in the current era of multi-core systems. Most prefetc...
Pedro Diaz, Marcelo Cintra
ALGOSENSORS
2009
Springer
15 years 10 months ago
Link Reversal: How to Play Better to Work Less
Sensor networks, with their ad hoc deployments, node mobility, and wireless communication, pose serious challenges for developing provably correct and efficient applications. A po...
Bernadette Charron-Bost, Jennifer L. Welch, Josef ...
TRUST
2009
Springer
15 years 10 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
ATAL
2009
Springer
15 years 10 months ago
Emergent service provisioning and demand estimation through self-organizing agent communities
A major challenge within open markets is the ability to satisfy service demand with an adequate supply of service providers, especially when such demand may be volatile due to cha...
Mariusz Jacyno, Seth Bullock, Michael Luck, Terry ...
ATAL
2009
Springer
15 years 10 months ago
Characterizing false-name-proof allocation rules in combinatorial auctions
A combinatorial auction mechanism consists of an allocation rule that defines the allocation of goods for each agent, and a payment rule that defines the payment of each winner....
Taiki Todo, Atsushi Iwasaki, Makoto Yokoo, Yuko Sa...
« Prev « First page 5489 / 5649 Last » Next »