Sciweavers

759 search results - page 107 / 152
» What Can Be Implemented Anonymously
Sort
View
MOBIDE
1999
ACM
14 years 2 months ago
Recovery Guarantees in Mobile Systems
Mobile applications increasingly require transaction-like properties, particularly those of recovery. Because there is a lack of abstractions to decompose the machinery of recover...
Cris Pedregal Martin, Krithi Ramamritham
ICCAD
1998
IEEE
120views Hardware» more  ICCAD 1998»
14 years 2 months ago
Communication synthesis for distributed embedded systems
Designers of distributed embedded systems face many challenges in determining the appropriate tradeoffs to make when defining a system architecture or retargeting an existing desi...
Ross B. Ortega, Gaetano Borriello
DL
1998
Springer
111views Digital Library» more  DL 1998»
14 years 2 months ago
Practical Application of Existing Hypermedia Standards and Tools
In order for multimedia presentations to be stored, accessed and played from a large library they should not be encoded as final form presentations, since these consume storage sp...
Lloyd Rutledge, Jacco van Ossenbruggen, Lynda Hard...
SPAA
1998
ACM
14 years 2 months ago
Computation-Centric Memory Models
We present a computation-centric theory of memory models. Unlike traditional processor-centric models, computation-centric models focus on the logical dependencies among instructi...
Matteo Frigo, Victor Luchangco
ICS
1993
Tsinghua U.
14 years 2 months ago
Dynamic Control of Performance Monitoring on Large Scale Parallel Systems
Performance monitoring of large scale parallel computers creates a dilemma: we need to collect detailed information to find performance bottlenecks, yet collecting all this data ...
Jeffrey K. Hollingsworth, Barton P. Miller