Sciweavers

790 search results - page 141 / 158
» Limits of Work-Stealing Scheduling
Sort
View
90
Voted
CHI
2003
ACM
16 years 25 days ago
Ethnographic interviews guide design of ford vehicles website
This case study describes ethnographic interviews with vehicle buyers to learn how they make purchase decisions. The research was conducted for J. Walter Thompson (JWT), the digit...
Lori Anschuetz, Stephanie Rosenbaum
109
Voted
ISLPED
2009
ACM
178views Hardware» more  ISLPED 2009»
15 years 7 months ago
Power management in energy harvesting embedded systems with discrete service levels
Power management has been a critical issue in the design of embedded systems due to the limited power supply. To prolong the lifetime, energy minimization has been studied under p...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
ESCIENCE
2007
IEEE
15 years 6 months ago
Decentralised Resource Discovery Service for Large Scale Federated Grids
Efficient Resource discovery mechanism is one of the fundamental requirement for Grid computing systems, as it aids in resource management and scheduling of applications. Resourc...
Rajiv Ranjan, Lipo Chan, Aaron Harwood, Shanika Ka...
ASPLOS
2006
ACM
15 years 6 months ago
Tradeoffs in transactional memory virtualization
For transactional memory (TM) to achieve widespread acceptance, transactions should not be limited to the physical resources of any specific hardware implementation. TM systems s...
JaeWoong Chung, Chi Cao Minh, Austen McDonald, Tra...
110
Voted
RTAS
2005
IEEE
15 years 6 months ago
Bounding Worst-Case Data Cache Behavior by Analytically Deriving Cache Reference Patterns
While caches have become invaluable for higher-end architectures due to their ability to hide, in part, the gap between processor speed and memory access times, caches (and partic...
Harini Ramaprasad, Frank Mueller