Sciweavers

1456 search results - page 185 / 292
» Keeping encountered information
Sort
View
119
Voted
ISCA
1998
IEEE
151views Hardware» more  ISCA 1998»
15 years 6 months ago
Alternative Implementations of Two-Level Adaptive Branch Prediction
As the issue rate and depth of pipelining of high performance Superscalar processors increase, the importance of an excellent branch predictor becomes more vital to delivering the...
Tse-Yu Yeh, Yale N. Patt
105
Voted
ELPUB
1998
ACM
15 years 6 months ago
Issues in Electronic Publishing on the Medieval Slavic and Byzantine World
This paper presents the experience gained in work on two current Bulgarian projects aiming at the development of electronic resources for South-East European Studies, Slavic studi...
Milena Dobreva, Serguey Ivanov
SI3D
1997
ACM
15 years 6 months ago
Two-Handed Direct Manipulation on the Responsive Workbench
We have built a system that allows users to naturally manipulate virtual 3D models with both hands on the Responsive Workbench, a tabletop VR device. Our design is largely based u...
Lawrence D. Cutler, Bernd Fröhlich, Pat Hanra...
121
Voted
EDBT
2009
ACM
134views Database» more  EDBT 2009»
15 years 5 months ago
Caching content-based queries for robust and efficient image retrieval
In order to become an effective complement to traditional Web-scale text-based image retrieval solutions, content-based image retrieval must address scalability and efficiency iss...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
CCS
2006
ACM
15 years 5 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen