Sciweavers

13004 search results - page 2588 / 2601
» Mining Software Data
Sort
View
95
Voted
ISCA
2006
IEEE
144views Hardware» more  ISCA 2006»
14 years 9 months ago
Conditional Memory Ordering
Conventional relaxed memory ordering techniques follow a proactive model: at a synchronization point, a processor makes its own updates to memory available to other processors by ...
Christoph von Praun, Harold W. Cain, Jong-Deok Cho...
CPHYSICS
2007
106views more  CPHYSICS 2007»
14 years 9 months ago
The way towards thermonuclear fusion simulators
In parallel to the ITER project itself, many initiatives address complementary technological issues relevant to a fusion reactor, as well as many remaining scientific issues. One...
A. Bécoulet, Per Strand, H. Wilson, M. Roma...
JUCS
2008
166views more  JUCS 2008»
14 years 9 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
115
Voted
JUCS
2008
341views more  JUCS 2008»
14 years 9 months ago
IQM3: Information Quality Management Maturity Model
: In order to enhance their global business performance, organizations must be careful with the quality of their information since it is one of their main assets. Analogies to qual...
Ismael Caballero, Angelica Caro, Coral Calero, Mar...
100
Voted
ENTCS
2007
113views more  ENTCS 2007»
14 years 9 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
« Prev « First page 2588 / 2601 Last » Next »