Sciweavers

10909 search results - page 2060 / 2182
» Evaluating Backup Algorithms
Sort
View
AUIC
2006
IEEE
15 years 10 months ago
Patternprogrammer: yet another rule-based programming environment for children
Graphical rewrite rules are often used in programming environments for children. These rules consist of two parts: a left-hand side, which is visually matched in the environment, ...
Tim Wright
128
Voted
CGO
2006
IEEE
15 years 10 months ago
Exhaustive Optimization Phase Order Space Exploration
The phase-ordering problem is a long standing issue for compiler writers. Most optimizing compilers typically have numerous different code-improving phases, many of which can be a...
Prasad Kulkarni, David B. Whalley, Gary S. Tyson, ...
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
15 years 10 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
122
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
Propagation Channel Characteristics for Peer-to-Peer Multiple Antenna Systems at 300 MHz
This paper presents results from the first double-directional measurements of the Multiple-Input Multiple-Output (MIMO) peer-to-peer radio channel in the 300 MHz frequency range....
Gunnar Eriksson, Fredrik Tufvesson, Andreas F. Mol...
GLOBECOM
2006
IEEE
15 years 10 months ago
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in Wireless Sensor Networks
— Coverage is an important issue related to WSN quality of service. Several centralized/decentralized solutions based on the geometry information of sensors and under the assumpt...
Azzedine Boukerche, Xin Fei, Regina Borges de Arau...
« Prev « First page 2060 / 2182 Last » Next »