Sciweavers

12519 search results - page 2337 / 2504
» Approximation Problems Categories
Sort
View
IEEEPACT
2006
IEEE
15 years 10 months ago
Communist, utilitarian, and capitalist cache policies on CMPs: caches as a shared resource
As chip multiprocessors (CMPs) become increasingly mainstream, architects have likewise become more interested in how best to share a cache hierarchy among multiple simultaneous t...
Lisa R. Hsu, Steven K. Reinhardt, Ravishankar R. I...
IEEEPACT
2006
IEEE
15 years 10 months ago
Hardware support for spin management in overcommitted virtual machines
Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gan...
Philip M. Wells, Koushik Chakraborty, Gurindar S. ...
ISESE
2006
IEEE
15 years 10 months ago
A goal question metric based approach for efficient measurement framework definition
In software engineering, measurements can be used to monitor, understand and improve software processes as well as products and resource utilization. Commonly, measurement framewo...
Patrik Berander, Per Jönsson
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
15 years 10 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
ACMSE
2006
ACM
15 years 10 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
« Prev « First page 2337 / 2504 Last » Next »