Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
34202
search results - page 111 / 6841
»
The Tera computer system
Sort
relevance
views
votes
recent
update
View
thumb
title
118
click to vote
WORDS
2002
IEEE
107
views
Embedded Systems
»
more
WORDS 2002
»
Technology Challenges for Building Internet-Scale Ubiquitous Computing
15 years 9 months ago
Download
www.cl.cam.ac.uk
Tatsuo Nakajima, Hiroo Ishikawa, Eiji Tokunaga, Fr...
claim paper
Read More »
100
click to vote
LCR
2000
Springer
126
views
System Software
»
more
LCR 2000
»
High Level Programming Methodologies for Data Intensive Computations
15 years 8 months ago
Download
bmi.osu.edu
Gagan Agrawal, Renato Ferreira, Ruoming Jin, Joel ...
claim paper
Read More »
114
click to vote
RTSS
1995
IEEE
83
views
Control Systems
»
more
RTSS 1995
»
Real-Time Computing with Lock-Free Shared Objects
15 years 8 months ago
Download
www.hh.se
James H. Anderson, Srikanth Ramamurthy, Kevin Jeff...
claim paper
Read More »
109
click to vote
USENIX
2008
85
views
Operating System
»
more
USENIX 2008
»
The XtreemOS JScheduler: Using Self-Scheduling Techniques in Large Computing Architectures
15 years 7 months ago
Download
www.usenix.org
Francesc Guim, Ivan Rodero, M. Garcia, Julita Corb...
claim paper
Read More »
171
click to vote
ICARIS
2007
Springer
205
views
Artificial Intelligence
»
more
ICARIS 2007
»
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
15 years 10 months ago
Download
www.cs.bham.ac.uk
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
claim paper
Read More »
« Prev
« First
page 111 / 6841
Last »
Next »