Sciweavers

1406 search results - page 161 / 282
» Similarity in Programs
Sort
View
CAL
2006
15 years 3 months ago
Performance, power efficiency and scalability of asymmetric cluster chip multiprocessors
This paper evaluates asymmetric cluster chip multiprocessor (ACCMP) architectures as a mechanism to achieve the highest performance for a given power budget. ACCMPs execute serial ...
T. Y. Morad, Uri C. Weiser, A. Kolodnyt, Mateo Val...
COMPSEC
2006
141views more  COMPSEC 2006»
15 years 3 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
IJAC
2006
87views more  IJAC 2006»
15 years 3 months ago
Evaluation Properties of Symmetric Polynomials
By the fundamental theorem of symmetric polynomials, if P Q[X1, . . . , Xn] is symmetric, then it can be written P = Q(1, . . . , n), where 1, . . . , n are the elementary symmet...
Pierrick Gaudry, Éric Schost, Nicolas M. Th...
MP
2006
79views more  MP 2006»
15 years 3 months ago
Projection results for vehicle routing
A variety of integer programming formulations have been proposed for Vehicle Routing Problems (VRPs), including the so-called two- and three-index formulations, the set partitioni...
Adam N. Letchford, Juan José Salazar Gonz&a...
JCIT
2007
91views more  JCIT 2007»
15 years 3 months ago
A Tool to Personalize the Ranking of the Documents Returned by an Internet Search Engine
Internet search engines identify web pages that contain user-specified keywords, and then rank these pages according to their (heuristically assessed) relevance to the user’s qu...
Wadee S. Alhalabi, Miroslav Kubat, Moiez A. Tapia