Sciweavers

5799 search results - page 1130 / 1160
» Patterns Generate Architectures
Sort
View
DSN
2005
IEEE
15 years 6 months ago
Checking Array Bound Violation Using Segmentation Hardware
The ability to check memory references against their associated array/buffer bounds helps programmers to detect programming errors involving address overruns early on and thus avo...
Lap-Chung Lam, Tzi-cker Chiueh
118
Voted
KBSE
2005
IEEE
15 years 6 months ago
Automating experimentation on distributed testbeds
Engineering distributed systems is a challenging activity. This is partly due to the intrinsic complexity of distributed systems, and partly due to the practical obstacles that de...
Yanyan Wang, Matthew J. Rutherford, Antonio Carzan...
120
Voted
MOBICOM
2005
ACM
15 years 6 months ago
Characterizing the capacity region in multi-radio multi-channel wireless mesh networks
Next generation fixed wireless broadband networks are being increasingly deployed as mesh networks in order to provide and extend access to the internet. These networks are chara...
Murali S. Kodialam, Thyaga Nandagopal
142
Voted
VEE
2005
ACM
143views Virtualization» more  VEE 2005»
15 years 6 months ago
Optimized interval splitting in a linear scan register allocator
We present an optimized implementation of the linear scan register allocation algorithm for Sun Microsystems’ Java HotSpotTM client compiler. Linear scan register allocation is ...
Christian Wimmer, Hanspeter Mössenböck
CIKM
2005
Springer
15 years 6 months ago
Person resolution in person search results: WebHawk
Finding information about people on the Web using a search engine is difficult because there is a many-to-many mapping between person names and specific persons (i.e. referents). ...
Xiaojun Wan, Jianfeng Gao, Mu Li, Binggong Ding
« Prev « First page 1130 / 1160 Last » Next »