Sciweavers

2256 search results - page 447 / 452
» The Modeling for Dynamic Power Management of Embedded System...
Sort
View
SIGMETRICS
2002
ACM
13 years 8 months ago
Full-system timing-first simulation
Computer system designers often evaluate future design alternatives with detailed simulators that strive for functional fidelity (to execute relevant workloads) and performance fi...
Carl J. Mauer, Mark D. Hill, David A. Wood
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 3 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
HICSS
2003
IEEE
135views Biometrics» more  HICSS 2003»
14 years 1 months ago
Market Entry Strategies of Application Service Providers: Identifying Strategic Differentiation
In the last few years there has been much interest in the delivery of software-as-a-service. The concept of the remote delivery of software by Application Service Providers (ASPs)...
Bhavini Desai, Vishanth Weerakkody, Wendy Currie, ...
SC
2005
ACM
14 years 2 months ago
Leading Computational Methods on Scalar and Vector HEC Platforms
The last decade has witnessed a rapid proliferation of superscalar cache-based microprocessors to build high-end computing (HEC) platforms, primarily because of their generality, ...
Leonid Oliker, Jonathan Carter, Michael F. Wehner,...
NSDI
2008
13 years 11 months ago
Phalanx: Withstanding Multimillion-Node Botnets
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality on the Internet. They are simple to execute and with the growing prevalence and size of...
Colin Dixon, Thomas E. Anderson, Arvind Krishnamur...