Sciweavers

6149 search results - page 1075 / 1230
» Revealing the programming process
Sort
View
ISCA
2003
IEEE
88views Hardware» more  ISCA 2003»
15 years 9 months ago
Dynamically Managing the Communication-Parallelism Trade-off in Future Clustered Processors
Clustered microarchitectures are an attractive alternative to large monolithic superscalar designs due to their potential for higher clock rates in the face of increasingly wire-d...
Rajeev Balasubramonian, Sandhya Dwarkadas, David H...
ISSRE
2003
IEEE
15 years 9 months ago
Test-Driven Development as a Defect-Reduction Practice
Test-driven development is a software development practice that has been used sporadically for decades. With this practice, test cases (preferably automated) are incrementally wri...
Laurie A. Williams, E. Michael Maximilien, Mladen ...
MICRO
2003
IEEE
152views Hardware» more  MICRO 2003»
15 years 9 months ago
A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor
Single-event upsets from particle strikes have become a key challenge in microprocessor design. Techniques to deal with these transient faults exist, but come at a cost. Designers...
Shubhendu S. Mukherjee, Christopher T. Weaver, Joe...
147
Voted
NDSS
2003
IEEE
15 years 9 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
SRDS
2003
IEEE
15 years 9 months ago
Performance and Effectiveness Analysis of Checkpointing in Mobile Environments
Many mathematical models have been proposed to evaluate the execution performance of an application with and without checkpointing in the presence of failures. They assume that th...
Xinyu Chen, Michael R. Lyu
« Prev « First page 1075 / 1230 Last » Next »