Sciweavers

1357 search results - page 267 / 272
» Maintainability through Architecture Development
Sort
View
83
Voted
MICRO
2005
IEEE
163views Hardware» more  MICRO 2005»
15 years 3 months ago
ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing
As more data value speculation mechanisms are being proposed to speed-up processors, there is growing pressure on the critical processor structures that must buffer the state of t...
Smruti R. Sarangi, Wei Liu, Yuanyuan Zhou
SOUPS
2005
ACM
15 years 3 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
MOBICOM
2004
ACM
15 years 2 months ago
Performance evaluation of safety applications over DSRC vehicular ad hoc networks
In this paper we conduct a feasibility study of delay-critical safety applications over vehicular ad hoc networks based on the emerging dedicated short range communications (DSRC)...
Jijun Yin, Tamer A. ElBatt, Gavin Yeung, Bo Ryu, S...
VRML
2004
ACM
15 years 2 months ago
Interactive Web-based visualisation of block model data
Mining operations have traditionally used specialised software packages to process and visualise valuable mining data. The downside to this approach is that the information can on...
Tony Gill, Con Caris, Guy LeBlanc Smith
93
Voted
INFOCOM
2003
IEEE
15 years 2 months ago
Modeling Peer-Peer File Sharing Systems
— Peer-peer networking has recently emerged as a new paradigm for building distributed networked applications. In this paper we develop simple mathematical models to explore and ...
Zihui Ge, Daniel R. Figueiredo, Sharad Jaiswal, Ja...