Sciweavers

8655 search results - page 1444 / 1731
» Challenges for Trusted Computing
Sort
View
132
Voted
VSTTE
2005
Springer
15 years 9 months ago
Performance Validation on Multicore Mobile Devices
The validation of modern software systems on mobile devices needs to incorporate both functional and non-functional requirements. While some progress has been made in validating pe...
Thomas Hubbard, Raimondas Lencevicius, Edu Metz, G...
124
Voted
GIAE
2004
Springer
136views Mathematics» more  GIAE 2004»
15 years 8 months ago
Implicit Reduced Involutive Forms and Their Application to Engineering Multibody Systems
Abstract. The RifSimp package in Maple transforms a set of differential equations to Reduced Involutive Form. This paper describes the application of RifSimp to challenging real-w...
Wenqin Zhou, David J. Jeffrey, Gregory J. Reid, Ch...
163
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
Adapting asynchronous messaging middleware to ad hoc networking
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particu...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
127
Voted
VLDB
2004
ACM
114views Database» more  VLDB 2004»
15 years 8 months ago
Hardware Acceleration in Commercial Databases: A Case Study of Spatial Operations
Traditional databases have focused on the issue of reducing I/O cost as it is the bottleneck in many operations. As databases become increasingly accepted in areas such as Geograp...
Nagender Bandi, Chengyu Sun, Amr El Abbadi, Divyak...
106
Voted
ISCA
2003
IEEE
123views Hardware» more  ISCA 2003»
15 years 8 months ago
Detecting Global Stride Locality in Value Streams
Value prediction exploits localities in value streams. Previous research focused on exploiting two types of value localities, computational and context-based, in the local value h...
Huiyang Zhou, Jill Flanagan, Thomas M. Conte
« Prev « First page 1444 / 1731 Last » Next »