Sciweavers

669 search results - page 64 / 134
» critical 2005
Sort
View
CGO
2005
IEEE
15 years 5 months ago
Performance of Runtime Optimization on BLAST
Optimization of a real world application BLAST is used to demonstrate the limitations of static and profile-guided optimizations and to highlight the potential of runtime optimiz...
Abhinav Das, Jiwei Lu, Howard Chen, Jinpyo Kim, Pe...
CGO
2005
IEEE
15 years 5 months ago
Reactive Techniques for Controlling Software Speculation
Aggressive software speculation holds significant potential, because it enables program transformations to reduce the program’s critical path. Like any form of speculation, how...
Craig B. Zilles, Naveen Neelakantam
CNSR
2005
IEEE
116views Communications» more  CNSR 2005»
15 years 5 months ago
Connectivity with Static Transmission Range in Vehicular Ad Hoc Networks
Connectivity in mobile wireless ad-hoc networks is maintained by setting the transmission range so that a node can establish a link to any other node in the network either directl...
Maen M. Artimy, William J. Phillips, William Rober...
CNSR
2005
IEEE
15 years 5 months ago
Third-Party Flow Control
Flow control is critical to the efficient operation of Internet Service Providers network equipment. In particular, the ability to effectively shape traffic can reduce cost and ...
Dushyant Bansal, Paul A. S. Ward
CODES
2005
IEEE
15 years 5 months ago
Comparing the size of .NET applications with native code
Byte-code based languages are slowly becoming adopted in embedded domains because of improved security and portability. Another potential reason for their adoption is the reputati...
Roberto Costa, Erven Rohou