Sciweavers

151 search results - page 23 / 31
» From Monads to Effects and Back
Sort
View
EOR
2006
135views more  EOR 2006»
14 years 10 months ago
Principles of scatter search
Scatter search is an evolutionary method that has been successfully applied to hard optimization problems. The fundamental concepts and principles of the method were first propose...
Rafael Martí, Manuel Laguna, Fred Glover
PLDI
1994
ACM
15 years 2 months ago
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses
As microprocessor speeds increase, memory bandwidth is increasing y the performance bottleneck for microprocessors. This has occurred because innovation and technological improvem...
Jack W. Davidson, Sanjay Jinturkar
EUROSYS
2011
ACM
14 years 1 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...
INFOCOM
2005
IEEE
15 years 4 months ago
Design and implementation of network puzzles
Abstract— Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provid...
Wu-chi Feng, Edward C. Kaiser, A. Luu
BCSHCI
2007
14 years 11 months ago
An empirical investigation into dual-task trade-offs while driving and dialing
Engaging in a secondary task, such as dialing a cell phone, while driving a car has been found to have a deleterious effect on driver performance. A point often overlooked though ...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes