Sciweavers

5786 search results - page 1063 / 1158
» Lines Pinning Lines
Sort
View
ISCA
2002
IEEE
68views Hardware» more  ISCA 2002»
15 years 5 months ago
Timekeeping in the Memory System: Predicting and Optimizing Memory Behavior
Techniques for analyzing and improving memory referencing behavior continue to be important for achieving good overall program performance due to the ever-increasing performance g...
Zhigang Hu, Margaret Martonosi, Stefanos Kaxiras
ISCC
2002
IEEE
135views Communications» more  ISCC 2002»
15 years 5 months ago
End-to-end versus explicit feedback measurement in 802.11 networks
Higher layer protocols in wireless networks need to dynamically adapt to observed network response. The common approach is that each session employs end-to-end monitoring to estim...
Manthos Kazantzidis, Mario Gerla
125
Voted
SACMAT
2010
ACM
15 years 5 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SPAA
2010
ACM
15 years 5 months ago
Delays induce an exponential memory gap for rendezvous in trees
The aim of rendezvous in a graph is meeting of two mobile agents at some node of an unknown anonymous connected graph. The two identical agents start from arbitrary nodes in the g...
Pierre Fraigniaud, Andrzej Pelc
81
Voted
ICWE
2010
Springer
15 years 5 months ago
Interfaces for Scripting: Making Greasemonkey Scripts Resilient to Website Upgrades
Thousands of users are streamlining their Web interactions through user scripts using special weavers such as Greasemonkey. Thousands of programmers are releasing their scripts in ...
Oscar Díaz, Cristóbal Arellano, Jon ...
« Prev « First page 1063 / 1158 Last » Next »