... “ Championing change : An interview with Bell Atlantic's CEO Raymond Smith ” , Harvard Business Review 69 ( 1 ) ( 1991 ) 118–130 . [ 138 ] Kanter R.M. , “ Thinking across boundaries ” , Harvard Business Review 68 ( 6 ) ( 1990 ) 9 .
... 218, 247 Base Station Transceiver (BST), 217, 218 Basic block execution profiles, 81, 83 Basic blocks, fully qualified, 82 Behavior, as part of software architecture, 4 Bell basis, 285 Bell states, 281 Bell–LaPadula (BLP) model, ...
... fully qualified , 82 Behavior , as part of software architecture , 4 Bell basis , 285 Bell states , 281 Bell - LaPadula ( BLP ) model , 134-5 Benchmarks grouping , 74 similarity measurement approaches , 74 Biba model , 135 Billing ...
... 185, 202 Seliya, N., 251–253, 258, 259,288, 289 Shah, A., 208, 247 Shan, R., 256, 288 Shapiro, M., 134, 177 Shasha, D., 321, 325 Shepperd, M., 252,284, 288, 290 Shim, K., 298, 325 Shukla, A., 309, 326 Shull, F., 27, 34, 63–65 Simon, ...
This is volume 78 of Advances in Computers. This series, which began publication in 1960, is the oldest continuously published anthology that chronicles the ever- changing information technology field.
The loop-based data cache leakage optimization approach exploits the fact that the program hotspots often only access a limited number ... “Reducing leakage in a high-performance deep-submicron instruction cache”, IEEE Trans. VLSI 9 (1) ...
In-depth surveys and tutorials on new computer technology Well-known authors and researchers in the field Extensive bibliographies with most chapters Many of the volumes are devoted to single themes or subfields of computer science
As already noted, high-performance computing was at a critical juncture in the United States in the early 2000s, ... Without this government R&D participation, high-end computing might one day be available only through manufacturers of ...
This group's focus is the optimization of the scheduler for HPC applications, and the placement for the threads, processes and data for ... Bull validates and supports a Linux distribution well adapted to clusters of NovaScale machines.
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in hardware and software and in computer theory, design, and applications.
This is volume 73 of Advances in Computers. This series, which began publication in 1960, is the oldest continuously published anthology that chronicles the ever- changing information technology field.
This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry.
This current volume emphasizes information security issues and includes topics like certifying computer professionals, non-invasive attacks ("cognitive hacking"), computer files as legal evidence ("computer forensics") and the use of ...
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in hardware and software and in computer theory, design, and applications.
[16] A. Orebaugh, Wireshark & Ethereal Network Protocol Analyzer Toolkit, Syngress, Rockland, MA, 2007. [17] C. Sanders, Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, No Starch Press, San Francisco, ...
In-depth surveys and tutorials on new computer technology Well-known authors and researchers in the field Extensive bibliographies with most chapters Many of the volumes are devoted to single themes or subfields of computer science
In this volume we explore this phenomenon to describe the development of some of these ideas as well as developments in web technology that enable this to occur. This volume contains seven chapters divided into two parts.
Advances in Computers
3.2 Better Research in Data Base Computers There has been a number of advances in data base computer research prompted by the availability of more versatile technology and a better understanding of data base theory and software.
As history has shown in all past software engineering fads, the likely result will be an overheightening of expectations, which will lead to ... IT project risk management is the extra effort being spent on “relearning history.