Sciweavers

7961 search results - page 1218 / 1593
» Input-Output Model Programs
Sort
View
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 10 months ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson
INFOVIS
2002
IEEE
15 years 9 months ago
Visualization Schemas for Flexible Information Visualization
Relational databases provide significant flexibility to organize, store, and manipulate an infinite variety of complex data collections. This flexibility is enabled by the concept...
Chris North, Nathan Conklin, Varun Saini
ISSRE
2002
IEEE
15 years 9 months ago
Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects
In this paper we extend an earlier worst case bound reliability theory to derive a worst case reliability function R(t), which gives the worst case probability of surviving a furt...
Peter G. Bishop, Robin E. Bloomfield
BIRTHDAY
2009
Springer
15 years 9 months ago
Pervasive Theory of Memory
For many aspects of memory theoretical treatment already exists, in particular for: simple cache construction, store buers and store buer forwarding, cache coherence protocols, o...
Ulan Degenbaev, Wolfgang J. Paul, Norbert Schirmer
FPL
2009
Springer
82views Hardware» more  FPL 2009»
15 years 9 months ago
Program-driven fine-grained power management for the reconfigurable mesh
The reconfigurable mesh model for massively parallel computing has recently been rediscovered and proposed as the basis of a practical many-core architecture. With this paper, we...
Heiner Giefers, Marco Platzner
« Prev « First page 1218 / 1593 Last » Next »