Sciweavers

34229 search results - page 6593 / 6846
» Power-aware computing systems
Sort
View
PPOPP
1990
ACM
15 years 8 months ago
Concurrent Aggregates (CA)
Toprogrammassivelyconcurrent MIMDmachines, programmersneed tools for managingcomplexity. One important tool that has been used in the sequential programmingworld is hierarchies of...
Andrew A. Chien, William J. Dally
CCS
2007
ACM
15 years 7 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CF
2007
ACM
15 years 7 months ago
An analysis of the effects of miss clustering on the cost of a cache miss
In this paper we describe a new technique, called pipeline spectroscopy, and use it to measure the cost of each cache miss. The cost of a miss is displayed (graphed) as a histogra...
Thomas R. Puzak, Allan Hartstein, Philip G. Emma, ...
CHI
2007
ACM
15 years 7 months ago
Follow the reader: filtering comments on slashdot
Large-scale online communities need to manage the tension between critical mass and information overload. Slashdot is a news and discussion site that has used comment rating to al...
Cliff Lampe, Erik W. Johnston, Paul Resnick
CHI
2007
ACM
15 years 7 months ago
Social responses to virtual humans: implications for future interface design
Do human-human social interactions carry over to humanvirtual human social interactions? How does this affect future interface designers? We replicated classical tests of social i...
Catherine A. Zanbaka, Amy Catherine Ulinski, Paula...
« Prev « First page 6593 / 6846 Last » Next »