Sciweavers

26354 search results - page 5093 / 5271
» How we refactor, and how we know it
Sort
View
MICRO
2002
IEEE
131views Hardware» more  MICRO 2002»
15 years 6 months ago
Pointer cache assisted prefetching
Data prefetching effectively reduces the negative effects of long load latencies on the performance of modern processors. Hardware prefetchers employ hardware structures to predic...
Jamison D. Collins, Suleyman Sair, Brad Calder, De...
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
15 years 6 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
SIGMETRICS
2010
ACM
177views Hardware» more  SIGMETRICS 2010»
15 years 6 months ago
Managing the cost, energy consumption, and carbon footprint of internet services
The large amount of energy consumed by Internet services represents significant and fast-growing financial and environmental costs. Increasingly, services are exploring dynamic ...
Kien Le, Ozlem Bilgir, Ricardo Bianchini, Margaret...
SIGMOD
2010
ACM
198views Database» more  SIGMOD 2010»
15 years 6 months ago
Continuous analytics over discontinuous streams
Continuous analytics systems that enable query processing over steams of data have emerged as key solutions for dealing with massive data volumes and demands for low latency. Thes...
Sailesh Krishnamurthy, Michael J. Franklin, Jeffre...
ESWS
2010
Springer
15 years 6 months ago
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web
Abstract. With increasing usage of Social Networks, giving users the possibility to establish access restrictions on their data and resources becomes more and more important. Howev...
Philipp Kärger, Wolf Siberski
« Prev « First page 5093 / 5271 Last » Next »