The SCEAS System
Navigation Menu

Conferences in DBLP

Conference On Computing Frontiers (cf)
2005 (conf/cf/2005)

  1. Dietmar Fey, Daniel Schmidt
    Marching-pixels: a new organic computing paradigm for smart sensor processor arrays. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:1-9 [Conf]
  2. Thorsten Schöler, Christian Müller-Schloer
    First steps towards organic computing systems: monitoring an adaptive protocol stack with a fuzzy classifier system. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:10-20 [Conf]
  3. Amirali Baniasadi
    Balancing clustering-induced stalls to improve performance in clustered processors. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:21-27 [Conf]
  4. John Feo, David Harper, Simon Kahan, Petr Konecny
    ELDORADO. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:28-34 [Conf]
  5. Alexis De Vos, Yvan Van Rentergem
    Reversible computing: from mathematical group theory to electronical circuit experiment. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:35-44 [Conf]
  6. Daniel B. Miller, Edward Fredkin
    Two-state, reversible, universal cellular automata in three dimensions. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:45-51 [Conf]
  7. Tommaso Toffoli, Lev B. Levitin
    Specific ergodicity: an informative indicator for invertible computational media. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:52-58 [Conf]
  8. Niklas Therning, Lars Bengtsson
    Jalapeno: secentralized grid computing using peer-to-peer technology. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:59-65 [Conf]
  9. Li Chunlin, Li Layuan
    A two level market model for resource allocation optimization in computational grid. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:66-71 [Conf]
  10. Humberto Calderon, Stamatis Vassiliadis
    Reconfigurable universal SAD-multiplier array. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:72-76 [Conf]
  11. Martin Thuresson, Per Stenström
    Evaluation of extended dictionary-based static code compression schemes. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:77-86 [Conf]
  12. Cécile Germain-Renaud, Dephine Monnier-Ragaigne
    Grid result checking. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:87-96 [Conf]
  13. Kurt Maly, Mohammad Zubair, Vamshi Chilukamarri, Pratik Kothari
    GRID Based Federated Digital Library. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:97-105 [Conf]
  14. João M. P. Cardoso
    Dynamic loop pipelining in data-driven architectures. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:106-115 [Conf]
  15. Martin Schulz, Brian S. White, Sally A. McKee, Hsien-Hsin S. Lee, Jürgen Jeitner
    Owl: next generation system monitoring. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:116-124 [Conf]
  16. Valentina Salapura, Randy Bickford, Matthias A. Blumrich, Arthur A. Bright, Dong Chen, Paul Coteus, Alan Gara, Mark Giampapa, Michael Gschwind, Manish Gupta, Shawn Hall, Ruud A. Haring, Philip Heidelberger, Dirk Hoenicke, Gerard V. Kopcsay, Martin Ohmacht, Rick A. Rand, Todd Takken, Pavlos Vranas
    Power and performance optimization at the system level. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:125-132 [Conf]
  17. Mihai Udrescu, Lucian Prodan, Mircea Vladutiu
    Improving quantum circuit dependability with reconfigurable quantum gate arrays. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:133-144 [Conf]
  18. Claudia Roberta Calidonna, Adele Naddeo
    Using a hybrid CA based model for a flexible qualitative qubit simulation: fully frustrated josephson junction ladder (JJL) application. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:145-151 [Conf]
  19. Mathias Spjuth, Martin Karlsson, Erik Hagersten
    Skewed caches from a low-power perspective. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:152-160 [Conf]
  20. Nasir Mohyuddin, Rashed Bhatti, Michel Dubois
    Controlling leakage power with the replacement policy in slumberous caches. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:161-170 [Conf]
  21. Asadollah Shahbahrami, Ben H. H. Juurlink, Stamatis Vassiliadis
    Matrix register file and extended subwords: two techniques for embedded media processors. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:171-179 [Conf]
  22. Masayo Haneda, Peter M. W. Knijnenburg, Harry A. G. Wijshoff
    Optimizing general purpose compiler optimization. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:180-188 [Conf]
  23. K. Ananda Vardhan, Y. N. Srikant
    Transition aware scheduling: increasing continuous idle-periods in resource units. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:189-198 [Conf]
  24. Soraya Ghiasi, Tom W. Keller, Freeman L. Rawson III
    Scheduling for heterogeneous processors in server systems. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:199-210 [Conf]
  25. Tipp Moseley, Alex Shye, Vijay Janapa Reddi, Matthew Iyer, Dan Fay, David Hodgdon, Joshua L. Kihm, Alex Settle, Dirk Grunwald, Daniel A. Connors
    Dynamic run-time architecture techniques for enabling continuous optimization. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:211-220 [Conf]
  26. Alberto Ferrante, Vincenzo Piuri, Fabien Castanier
    A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:221-229 [Conf]
  27. Malik Silva
    Sparse matrix storage revisited. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:230-235 [Conf]
  28. Venu K. Murthy, E. V. Krishnamurthy
    Contextual information management using contract: based workflow. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:236-245 [Conf]
  29. Faruk Bagci, Holger Schick, Jan Petzold, Wolfgang Trumler, Theo Ungerer
    Communication and security extensions for a ubiquitous mobile agent system (UbiMAS). [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:246-251 [Conf]
  30. Steve Carr, Soner Önder
    A case for a working-set-based memory hierarchy. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:252-261 [Conf]
  31. Jarek Nieplocha, Manojkumar Krishnan, Bruce Palmer, Vinod Tipparaju, Yeliang Zhang
    Exploiting processor groups to extend scalability of the GA shared memory programming model. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:262-272 [Conf]
  32. Edward Fredkin
    A computing architecture for physics. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:273-279 [Conf]
  33. Jörg Platte, Edwin Naroska
    A combined hardware and software architecture for secure computing. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:280-288 [Conf]
  34. Fredrik Warg, Per Stenström
    Reducing misspeculation overhead for module-level speculative execution. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:289-298 [Conf]
  35. Braxton Thomason, Craig Chase
    Partially ordered epochs for thread-level speculation. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:299-306 [Conf]
  36. Christine Rochange, Pascal Sainrat
    A time-predictable execution mode for superscalar pipelines with instruction prescheduling. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:307-314 [Conf]
  37. Lambert Schaelicke, Kyle Wheeler, Curt Freeland
    SPANIDS: a scalable network intrusion detection loadbalancer. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:315-322 [Conf]
  38. Lucian Prodan, Mihai Udrescu, Mircea Vladutiu
    Reliability assessment in embryonics inspired by fault-tolerant quantum computation. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:323-333 [Conf]
  39. Chunrong Lai, Shih-Lien Lu, Yurong Chen, Trista Chen
    Improving branch prediction accuracy with parallel conservative correctors. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:334-341 [Conf]
  40. Thomas R. Puzak, Allan Hartstein, Philip G. Emma, Viji Srinivasan
    When prefetching improves/degrades performance. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:342-352 [Conf]
  41. Kuo-Su Hsiao, Chung-Ho Chen
    An efficient wakeup design for energy reduction in high-performance superscalar processors. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:353-360 [Conf]
  42. Nana B. Sam, Martin Burtscher
    On the energy-efficiency of speculative hardware. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:361-370 [Conf]
  43. Salvador Petit, Julio Sahuquillo, Jose M. Such, David R. Kaeli
    Exploiting temporal locality in drowsy cache policies. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:371-377 [Conf]
  44. Michael J. Geiger, Sally A. McKee, Gary S. Tyson
    Drowsy region-based caches: minimizing both dynamic and static power dissipation. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:378-384 [Conf]
  45. Michael P. Frank
    Introduction to reversible computing: motivation, progress, and challenges. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:385-390 [Conf]
  46. Erik DeBenedictis
    Reversible logic for supercomputing. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:391-402 [Conf]
  47. Craig S. Lent, Sarah E. Frost, Peter M. Kogge
    Reversible computation with quantum-dot cellular automata (QCA). [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:403- [Conf]
  48. Erik Forsberg
    The electron waveguide y-branch switch: a review and arguments for its use as a base for reversible logic. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:404-406 [Conf]
  49. Visvesh S. Sathe, Juang-Ying Chueh, Joohee Kim, Conrad H. Ziesler, Suhwan Kim, Marios C. Papaefthymiou
    Fast, efficient, recovering, and irreversible. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:407-413 [Conf]
  50. Stephan Henzler, Thomas Nirschl, Matthias Eireiner, Ettore Amirante, Doris Schmitt-Landsiedel
    Making adiabatic circuits attractive for todays VLSI industry by multi-mode operation-adiabatic mode circuits. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:414-420 [Conf]
  51. Seokkee Kim, Soo-Ik Chae
    Implementation of a simple 8-bit microprocessor with reversible energy recovery logic. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:421-426 [Conf]
  52. Jürgen Fischer, Philip Teichmann, Doris Schmitt-Landsiedel
    Scaling trends in adiabatic logic. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:427-434 [Conf]
  53. Paul M. B. Vitányi
    Time, space, and energy in reversible computing. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:435-444 [Conf]
  54. Lev B. Levitin, Tommaso Toffoli
    Thermodynamical cost of reversible computing. [Citation Graph (0, 0)][DBLP]
    Conf. Computing Frontiers, 2005, pp:445-446 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002