Sciweavers

274 search results - page 18 / 55
» When Two Case Bases Are Better than One: Exploiting Multiple...
Sort
View
CF
2006
ACM
14 years 1 months ago
Kilo-instruction processors, runahead and prefetching
There is a continuous research effort devoted to overcome the memory wall problem. Prefetching is one of the most frequently used techniques. A prefetch mechanism anticipates the ...
Tanausú Ramírez, Alex Pajuelo, Olive...
ECOOPW
1997
Springer
13 years 11 months ago
The Object Model for a Product Based Development Process
The traditional workflow process model is typically illustrated with a graph of activities, tasks, deliverables and techniques. From an object-oriented perspective, every identifi...
Pavel Hruby
JNW
2006
63views more  JNW 2006»
13 years 7 months ago
Operational Experiment of Seamless Handover of a Mobile Router using Multiple Care-of Address Registration
NEMO Basic Support (NEMO BS) adds a mobility function to IPv6 routers, such a router is called as a mobile router. The network behind the mobile router (mobile network) becomes log...
Keiichi Shima, Yojiro Uo, Nobuo Ogashiwa, Satoshi ...
BIBM
2007
IEEE
137views Bioinformatics» more  BIBM 2007»
14 years 1 months ago
A Multi-metric Similarity Based Analysis of Microarray Data
Clustering has been shown to be effective in analyzing functional relationships of genes. However, no single clustering method with single distance metric is capable of capturing ...
Fatih Altiparmak, Selnur Erdal, Ozgur Ozturk, Haka...
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu