Sciweavers

7839 search results - page 1414 / 1568
» What's there and what's not
Sort
View
CHI
2009
ACM
15 years 5 months ago
A comparison of mobile money-transfer UIs for non-literate and semi-literate users
Due to the increasing penetration of mobile phones even into poor communities, mobile payment schemes could bring formal financial services to the "unbanked". However, b...
Indrani Medhi, S. N. Nagasena Gautama, Kentaro Toy...
CONEXT
2007
ACM
15 years 5 months ago
Improving service differentiation in IP networks through dual topology routing
The convergence on IP of a wide variety of traffic types has strengthened the need for service differentiation. Service differentiation relies on two equally important components:...
Kin Wah Kwong, Roch Guérin, Anees Shaikh, S...
CLUSTER
2009
IEEE
15 years 5 months ago
24/7 Characterization of petascale I/O workloads
Abstract--Developing and tuning computational science applications to run on extreme scale systems are increasingly complicated processes. Challenges such as managing memory access...
Philip H. Carns, Robert Latham, Robert B. Ross, Ka...
DLS
2007
150views Languages» more  DLS 2007»
15 years 5 months ago
RPython: a step towards reconciling dynamically and statically typed OO languages
Although the C-based interpreter of Python is reasonably fast, implementations on the CLI or the JVM platforms offers some advantages in terms of robustness and interoperability. ...
Davide Ancona, Massimo Ancona, Antonio Cuni, Nicho...
DSN
2007
IEEE
15 years 5 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
« Prev « First page 1414 / 1568 Last » Next »