Sciweavers

3428 search results - page 213 / 686
» Making the Case
Sort
View
MICRO
2003
IEEE
152views Hardware» more  MICRO 2003»
15 years 9 months ago
A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor
Single-event upsets from particle strikes have become a key challenge in microprocessor design. Techniques to deal with these transient faults exist, but come at a cost. Designers...
Shubhendu S. Mukherjee, Christopher T. Weaver, Joe...
VISUALIZATION
2003
IEEE
15 years 9 months ago
Accelerating Large Data Analysis by Exploiting Regularities
We present techniques for discovering and exploiting regularity in large curvilinear data sets. The data can be based on a single mesh or a mesh composed of multiple submeshes (al...
David Ellsworth, Patrick J. Moran
127
Voted
GECCO
2003
Springer
15 years 9 months ago
Methods for Evolving Robust Programs
Many evolutionary computation search spaces require fitness assessment through the sampling of and generalization over a large set of possible cases as input. Such spaces seem par...
Liviu Panait, Sean Luke
ISCC
2002
IEEE
146views Communications» more  ISCC 2002»
15 years 9 months ago
How bad TCP can perform in mobile ad hoc networks
Several recent studies have indicated that TCP performance degrades significantly in mobile ad hoc networks. This paper examines how bad TCP may perform in such networks and prov...
Zhenghua Fu, Xiaoqiao Meng, Songwu Lu
NOMS
2002
IEEE
15 years 9 months ago
Message tracking in SOAP-based Web services
As web services become more prevalent, the nature of electronic transactions on the Internet changes from simple browser-to-business clicks to an orchestrated flow of messages bet...
Akhil Sahai, Vijay Machiraju, Jinsong Ouyang, Klau...