Sciweavers

1268 search results - page 85 / 254
» High Impact Requirements Engineering
Sort
View
ISCA
1998
IEEE
136views Hardware» more  ISCA 1998»
15 years 5 months ago
Exploiting Spatial Locality in Data Caches Using Spatial Footprints
Modern cache designs exploit spatial locality by fetching large blocks of data called cache lines on a cache miss. Subsequent references to words within the same cache line result...
Sanjeev Kumar, Christopher B. Wilkerson
COR
2007
109views more  COR 2007»
15 years 1 months ago
Assessing performance and uncertainty in developing carpet reverse logistics systems
TheUScarpetindustryisstrivingtoreacha40%diversionratefromlandfillsby2012,accordingtoamemorandum of understanding signed by industry and government officials in 2002. As a result...
Markus Biehl, Edmund Prater, Matthew J. Realff
JSAC
2006
127views more  JSAC 2006»
15 years 1 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
TWC
2010
14 years 8 months ago
Enhancing cell-edge performance: a downlink dynamic interference avoidance scheme with inter-cell coordination
Interference management has been a key concept for designing future high data-rate wireless systems that are required to employ dense reuse of spectrum. Static or semistatic interf...
Mahmudur Rahman, Halim Yanikomeroglu
WWW
2008
ACM
16 years 2 months ago
Value-driven design for "infosuasive" web applications
An infosuasive web application is mainly intended to be at the same time informative and persuasive, i.e., it aims at supporting knowledge needs and it has also the (declared or n...
Davide Bolchini, Franca Garzotto, Paolo Paolini