Sciweavers

1683 search results - page 233 / 337
» A Needed Narrowing Strategy
Sort
View
104
Voted
DSN
2009
IEEE
15 years 4 months ago
Processor reliability enhancement through compiler-directed register file peak temperature reduction
Each semiconductor technology generation brings us closer to the imminent processor architecture heat wall, with all its associated adverse effects on system performance and reliab...
Chengmo Yang, Alex Orailoglu
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
15 years 4 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
120
Voted
HICSS
2009
IEEE
161views Biometrics» more  HICSS 2009»
15 years 4 months ago
Configurative Service Engineering - A Rule-Based Configuration Approach for Versatile Service Processes in Corrective Maintenanc
Recently, service orientation has increasingly been debated both in research and practice. While researchers postulate a paradigm shift towards services as the basic unit of excha...
Jörg Becker, Daniel Beverungen, Ralf Knackste...
120
Voted
APWEB
2006
Springer
15 years 4 months ago
Sample Sizes for Query Probing in Uncooperative Distributed Information Retrieval
The goal of distributed information retrieval is to support effective searching over multiple document collections. For efficiency, queries should be routed to only those collectio...
Milad Shokouhi, Falk Scholer, Justin Zobel
78
Voted
ARCS
2006
Springer
15 years 4 months ago
Microcode with Embedded Timing Constraints
: Watchdogs are a well-known and widespread means to increase the safety of microprocessors. The programmer or the compiler must insert instructions to reset the watchdog. If the p...
Bernhard Fechner