Sciweavers

507 search results - page 71 / 102
» Testing implementations of transactional memory
Sort
View
124
Voted
CASES
2005
ACM
15 years 2 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
110
Voted
ICAC
2007
IEEE
15 years 6 months ago
Autonomous Return on Investment Analysis of Additional Processing Resources
As the use of virtualization and partitioning grows, it becomes possible to deploy a multi-tier web-based application with a variable amount of computing power. This introduces th...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
96
Voted
ICIS
2000
15 years 1 months ago
Trading partner trust in electronic commerce participation
The growth of business-to-business e-commerce has highlighted the role of computer and communications technologies as well as inter-organizational trust in developing and maintain...
Pauline Ratnasingham, Kuldeep Kumar
95
Voted
CN
2006
82views more  CN 2006»
15 years 17 days ago
Event-condition-action rules on RDF metadata in P2P environments
RDF is one of the technologies proposed to realise the vision of the Semantic Web and it is being increasingly used in distributed web-based applications. The use of RDF in applic...
George Papamarkos, Alexandra Poulovassilis, Peter ...
IJCSS
2007
97views more  IJCSS 2007»
15 years 13 days ago
Collaborative Multi-Agent-based e-Commerce Framework
Software agents offer a promise to change electronic commerce trading by helping traders to purchase products based on their interests and preferences. E-commerce systems are incr...
Tarek Helmy