Sciweavers

34229 search results - page 6613 / 6846
» Power-aware computing systems
Sort
View
137
Voted
HUC
2010
Springer
15 years 4 months ago
Modeling people's place naming preferences in location sharing
Most location sharing applications display people's locations on a map. However, people use a rich variety of terms to refer to their locations, such as "home," &qu...
Jialiu Lin, Guang Xiang, Jason I. Hong, Norman M. ...
154
Voted
GG
2008
Springer
15 years 4 months ago
Model-Driven Development of Model Transformations
The model-driven development of model transformations requires both a technique to model model transformations as well as a means to transform transformation models. Therefore, t...
Pieter Van Gorp
153
Voted
ACMDIS
2010
ACM
15 years 4 months ago
WallBots: interactive wall-crawling robots in the hands of public artists and political activists
Street art and political activism have a rich history of shaping urban landscapes. Our work explores the processes by which public artists and political activists contribute to pu...
Stacey Kuznetsov, Eric Paulos, Mark D. Gross
157
Voted
DAC
2010
ACM
15 years 4 months ago
Instruction cache locking using temporal reuse profile
The performance of most embedded systems is critically dependent on the average memory access latency. Improving the cache hit rate can have significant positive impact on the per...
Yun Liang, Tulika Mitra
CCS
2010
ACM
15 years 4 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
« Prev « First page 6613 / 6846 Last » Next »