Sciweavers

10633 search results - page 1954 / 2127
» Relating Distributed Objects
Sort
View
IFIP
2001
Springer
15 years 6 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
LPAR
2001
Springer
15 years 6 months ago
Boolean Functions for Finite-Tree Dependencies
Several logic-based languages, such as Prolog II and its successors, SICStus Prolog and Oz, offer a computation domain including rational trees. Infinite rational trees allow fo...
Roberto Bagnara, Enea Zaffanella, Roberta Gori, Pa...
RTSS
2000
IEEE
15 years 6 months ago
A User-Customizable Energy-Adaptive Combined Static/Dynamic Scheduler for Mobile Applications
In portable applications, the energy consumed by OS and application tasks primarily comes from DC battery source, which is limited and imposes an upper bound to the amount of time...
Trolan C. L. Ma, Kang G. Shin
SIGGRAPH
1999
ACM
15 years 6 months ago
Computing Exact Shadow Irradiance Using Splines
We present a solution to the general problem of characterizing shadows in scenes involving a uniform polygonal area emitter and a polygonal occluder in arbitrary position by manif...
Michael M. Stark, Elaine Cohen, Tom Lyche, Richard...
IPCCC
1999
IEEE
15 years 6 months ago
Accurately modeling speculative instruction fetching in trace-driven simulation
Performance evaluation of modern, highly speculative, out-of-order microprocessors and the corresponding production of detailed, valid, accurate results have become serious challe...
R. Bhargava, L. K. John, F. Matus
« Prev « First page 1954 / 2127 Last » Next »