Sciweavers

1494 search results - page 197 / 299
» Less Extreme Programming
Sort
View
122
Voted
ASPLOS
1994
ACM
15 years 6 months ago
Interleaving: A Multithreading Technique Targeting Multiprocessors and Workstations
There is an increasing trend to use commodity microprocessors as the compute engines in large-scale multiprocessors. However, given that the majority of the microprocessors are so...
James Laudon, Anoop Gupta, Mark Horowitz
90
Voted
ICLP
1989
Springer
15 years 6 months ago
A Simple Code Improvement Scheme for Prolog
The generation of efficient code for Prolog programs requires sophisticated code transformation and optimization systems. Much of the recent work in this area has focussed on hig...
Saumya K. Debray
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 6 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
133
Voted
CCGRID
2004
IEEE
15 years 6 months ago
Skeleton based performance prediction on shared networks
The performance skeleton of an application is a short running program whose performance in any scenario reflects the performance of the application it represents. Such a skeleton ...
Sukhdeep Sodhi, Jaspal Subhlok
DCOSS
2006
Springer
15 years 6 months ago
Y-Threads: Supporting Concurrency in Wireless Sensor Networks
Abstract. Resource constrained systems often are programmed using an eventbased model. Many applications do not lend themselves well to an event-based approach, but preemptive mult...
Christopher Nitta, Raju Pandey, Yann Ramin