Sciweavers

1791 search results - page 137 / 359
» Behavioral Operations
Sort
View
ISCA
2008
IEEE
137views Hardware» more  ISCA 2008»
15 years 11 months ago
Self-Optimizing Memory Controllers: A Reinforcement Learning Approach
Efficiently utilizing off-chip DRAM bandwidth is a critical issue in designing cost-effective, high-performance chip multiprocessors (CMPs). Conventional memory controllers deli...
Engin Ipek, Onur Mutlu, José F. Martí...
SC
1990
ACM
15 years 8 months ago
Tracing application program execution on the Cray X-MP and Cray 2
Important insights into program operation can be gained by observing dynamic execution behavior. Unfortunately, many high-performance machines provide execution profile summaries ...
Allen D. Malony, John L. Larson, Daniel A. Reed
GECCO
2004
Springer
105views Optimization» more  GECCO 2004»
15 years 10 months ago
Evolution-Based Deliberative Planning for Cooperating Unmanned Ground Vehicles in a Dynamic Environment
Many challenges remain in the development of tactical planning systems that will enable automated, cooperative replanning of routes and mission assignments for multiple unmanned gr...
Talib S. Hussain, David J. Montana, Gordon Vidaver
POPL
2007
ACM
16 years 4 months ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
CSCW
2010
ACM
16 years 1 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...