Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Topic List  Advanced Search  
Sample search results for: aaa program multi-tier

Page:   2  3  4  5 
 
1 ADSM: A Hybrid DSM Protocol that Efficiently Adapts to Sharing Patterns \Lambda
 

Summary:  the ! \Gamma x algorithm. The program generates a 2D seismic section from a 3D array of seismic input data... ) is deferred until a processor suffers an access miss on the page. Tread­ Marks divides the program execution... applications. This conclu­ 12 #12; AAAA AAAA AAAA ...

  

Source: Bianchini, Ricardo - Department of Computer Science, Rutgers University

 

Collection: Computer Technologies and Information Sciences

 
2 Three Architectural Models for CompilerControlled Speculative Execution
 

Summary:  Introduction For non­numeric programs, there is insufficient instruction level parallelism available within... not alter the behavior of the program. Dynamically scheduled processors can use hardware branch prediction... terminates the program nor incorrectly overwrite a value when the branch is mispredicted. Various hardware

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
3 Performance Measurement and Prediction in a Distributed Telerobotics System \Lambda
 

Summary:  program can be used to randomly select and highlight the target points. Performance measurements are taken... . AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Skubic, Marjorie - Departments of Computer Science & Electrical and Computer Engineering, University of Missouri-Columbia

 

Collection: Engineering

 
4 Efficiently Adapting to Sharing Patterns in Software DSMs \Lambda Luiz Rodolpho Monnerat z and Ricardo Bianchini
 

Summary:  the paper. 2 Background 2.1 LRC and TreadMarks The LRC algorithm [15] divides the program execution... DSMs, e.g. [2, 14]. The other two applications are seismic migration programs [12], MigFreq and Mig... Freq performs 2D post­stack seismic migration us­ ing the ! \Gamma x algorithm. The program generates a 2D seis

  

Source: Bianchini, Ricardo - Department of Computer Science, Rutgers University

 

Collection: Computer Technologies and Information Sciences

 
5 Identifying Contact Formations from Force Signals: A Comparison of Fuzzy and Neural Network Classifiers \Lambda
 

Summary:  skills to robots by using human demon­ stration. Robot programming by demonstration pro­ vides a natural... ­GeoQuest, Houston, TX. tional complexity found in model­based program gen­ eration. For this purpose, we model... ] between workpieces. In this way, the learning process is simplified and the learned program should be ...

  

Source: Skubic, Marjorie - Departments of Computer Science & Electrical and Computer Engineering, University of Missouri-Columbia

 

Collection: Engineering

 
6 Implementation of Backpropagation Neural
 

Summary:  applications onto large parallel systems. Many parallel neural training programs have been implemented... , but most are tested on none or few real applications. If the programs are tested for large neural networks... the Internet and pro­ grammed using the C programming language. The results indicate that the training speed

  

Source: Torresen, Jim - Department of Informatics, Universitetet i Oslo

 

Collection: Engineering ; Computer Technologies and Information Sciences

 
7 A Telerobotics Construction Set with Integrated Performance Analysis \Lambda
 

Summary:  . program generated). Although TelRIP does not enforce an explicit class hierarchy, it is convenient... by a set of programs called Pro­ cessing Modules. Like the data object types, the functional modules may... mechansim allows a monitoring program to ``tap into'' any data stream. Because data are routed based

  

Source: Skubic, Marjorie - Departments of Computer Science & Electrical and Computer Engineering, University of Missouri-Columbia

 

Collection: Engineering

 
8 Superblock Formation Using Static Program Analysis Richard E. Hank Scott A. Mahlke Roger A. Bringmann John C. Gyllenhaal Wenmei W. Hwu
 

Summary:  Superblock Formation Using Static Program Analysis Richard E. Hank Scott A. Mahlke Roger A... in the program. However, there are addi­ tional opportunities to increase ILP along some ex­ ecution sequences... . This paper presents a set of static program analysis heuristics used in the IMPACT compiler to identify

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
9 FEBRUARY 1998 INCLUDES WINTER SUMMARY
 

Summary:  78 102 77 56 84 93 103 43 39 83 83 44 79 103 80 77 100 103 46 AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA... AAAA AAAA AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
10 Kendall, Malkoun, and Jiang, The Layered Agent Pattern Language 1 THE LAYERED AGENT PATTERN LANGUAGE
 

Summary:  updating was required AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Schmidt, Douglas C. - Department of Electrical Engineering and Computer Science, Vanderbilt University

 

Collection: Computer Technologies and Information Sciences

 
11 OperatingSystem Level Tracing Tools for the DEC AXP Architecture Jason P. Casmira
 

Summary:  range of design questions. Traces taken from benchmark program execution (commonly from the SPEC95 suite... with a repeatable and representative sample of a program's execution. An issue which has frequently been ignored... . By periodically interrupting a program in order to allow other processes to run, the lifetime of a ...

  

Source: Kaeli, David R. - Department of Electrical and Computer Engineering, Northeastern University

 

Collection: Computer Technologies and Information Sciences

 
12 Designing and Reporting on Computational Experiments with Heuristic Methods
 

Summary:  of computational experiments with mathematical program­ ming software. These efforts began in the late 1970s... 75 85 95 102 110 120 130 140 Best Cost Current Cost AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Barr, Richard - Department of Engineering Management, Information, and Systems, Southern Methodist University

 

Collection: Engineering

 
13 OPTIMAL OPERATION OF INTEGRATED PROCESSES
 

Summary:  , the optimal control structure is found through solving an integer programming problem. The control structure... Council (NFR) through the program for computer aided chemical engineering is gratefully acknowledged... Integer Linear Programming LMTD Logarithmic Mean Temperature Difference LP Linear ...

  

Source: Skogestad, Sigurd - Department of Chemical Engineering, Norwegian University of Science and Technology

 

Collection: Engineering

 
14 Impact of CCNUMA Memory Management Policies on the Application
 

Summary:  programming and are capable of providing significant performance benefits both for scientific and commercial... . The program goes through as many iterations as the number of vertices, and during an iteration a particular... ) and is independent of the memory management policy. Let us define inter \Gamma arrival #12; 8 AAAA ...

  

Source: Bhuyan, Laxmi N. - Department of Computer Science and Engineering, University of California at Riverside

 

Collection: Computer Technologies and Information Sciences

 
15 Performance Characterization of Shared Attraction Memories in ClusterBased
 

Summary:  processor. From experiments with program­driven simulation it has been found that clustering significantly... using SimICS [13, 14], a program­driven simulator. SimICS is an instruction­level interpreter taking... ordinary binary programs and simulating their execution. A memory­ hierarchy simulator modelling the COMA

  

Source: Swedish Institute of Computer Science, Security, Policy and Trust Laboratory

 

Collection: Computer Technologies and Information Sciences

 
16 Performance Study of a Multithreaded Superscalar Microprocessor Manu Gulati Nader Bagherzadeh
 

Summary:  at various levels -- from coarse­grain parallelism, at the program or applica­ tion level, to very fine... is the responsibility of software, either being specified explicitly in the programming language or discovered... achievable performance. The paral­ lelism present in the program being executed (hence­ forth referred

  

Source: Bagherzadeh, Nader - Department of Electrical and Computer Engineering, University of California, Irvine

 

Collection: Computer Technologies and Information Sciences

 
17 Efficient SoftwareBased Fault Isolation Robert Wahbe Steven Lucco Thomas E. Anderson Susan L. Graham
 

Summary:  these software operations are portable and programming lan­ guage independent. Our approach poses a tradeoff... Center and the External Research Program), and the AT&T Foundation. Anderson was also supported... in the Proceedings of the Symposium on Op­ erating System Principles, 1993. 1 Introduction Application programs ...

  

Source: Anderson, Tom - Department of Computer Science and Engineering, University of Washington at Seattle

 

Collection: Computer Technologies and Information Sciences

 
18 The Superblock: An Effective Technique for VLIW and Superscalar Compilation
 

Summary:  the parallel hardware. However, ILP within basic blocks is extremely limited for control­intensive programs. We... into account a variety of architectural features. Index terms ­ code scheduling, control­intensive programs... for control­intensive programs [Jouppi and Wall 1989; Schuette and Shen 1991; Smith et al. 1989

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
19 The Effects of Inhomogeneities and Anisotropies on Electrocardiographic Fields
 

Summary:  was accomplished with a segmentation program that allowed the user to view the MRI to manually select boundary... the effect of selectively adding inhomogeneous regions to an otherwise homogeneous #12; 6 AAAA AAAA AAAA AAAA... AAAA AAAA ...

  

Source: Utah, University of - Scientific Computing and Imaging Institute

 

Collection: Computer Technologies and Information Sciences

 
20 JANUARY 1998 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 10 Number 1
 

Summary:  , North Carolina, South Carolina, and Virginia. #12;AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA... AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences


Page:   2  3  4  5 
Page:   1  2  3  4  5 
 
21 Appeared in ASPLOSVI Proceedings, Oct 1994 1 Dynamic Memory Disambiguation Using the Memory Conflict Buffer
 

Summary:  in the presence of memory store/load depen­ dences. Correct program execution is ensured by the memory conflict... an aggressive code scheduling model can be achieved for both non­numerical and numerical programs. 1... occur on program critical paths, such loss of code reordering opportunities can severely impair

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
22 Adaptive Load-Balancing Algorithms using Symmetric Broadcast Networks: Performance Study on an IBM SP2
 

Summary:  or dynamic. A static allocation [12] relates to decisions made at compile time, and compile-time programming... , the program with no load balancing (nobal) performs by far the worst. The random algo- rithm, although... ; however, the Receiver #12; AAAA AAAA AAAA AAAA ...

  

Source: Harvey, Dan - Computer Science Department, Southern Oregon University

 

Collection: Computer Technologies and Information Sciences

 
23 OCTOBER 1997 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 9 Number 10
 

Summary:  drier than normal. #12;AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAAAAAA AAAA AAAA AAAA... AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
24 ARCHITECTURAL AND SOFTWARE SUPPORT FOR EXECUTING NUMERICAL APPLICATIONS ON HIGH PERFORMANCE COMPUTERS
 

Summary:  memory multiprocessors provide a cost-e ective platform for parallel execution of numer- ical programs... and 2 e cient execution of the parallel program on a multiprocessor. This thesis addresses the second... step within the scope of automatically parallelized FORTRAN programs. In this thesis, the mismatch

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
25 Compromise in Negotiation: Exploiting Worth Functions over States \Lambda
 

Summary:  memory multiprocessors provide a cost-e ective platform for parallel execution of numer- ical programs... and 2 e cient execution of the parallel program on a multiprocessor. This thesis addresses the second... step within the scope of automatically parallelized FORTRAN programs. In this thesis, the mismatch

  

Source: Rosenschein, Jeff - School of Computer Science and Engineering, Hebrew University of Jerusalem

 

Collection: Computer Technologies and Information Sciences

 
26 Data Relocation and Prefetching for Programs with Large Data Sets
 

Summary:  Data Relocation and Prefetching for Programs with Large Data Sets Yoji Yamada, John Gyllenhaal... , data relocation, program optimization, software prefetching. 1 Introduction Numerical applications... to the original program arrays. In order to minimize the overhead of compressing and decompressing data

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
27 AUGUST 1997 Includes 1997 Summer Summary
 

Summary:  was much wetter than normal. #12;AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAAAAAA... AAAA AAAAAAAAAAAA AAAA AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
28 ANALYSIS OF INTERTASK COMMUNICATION IN PVM COMPUTATIONS
 

Summary:  Traces to Simulation Input : : : : : : : : : : : : : : : : : : : : 30 4 Simulations of PVM Program... : : : : : : : : : : : : : : : : : : : : : : 41 5 PVM Benchmark Programs 44 5.1 Multigrid... a heterogeneous collection of com- puters as one "virtual" machine. PVM programs use the message-passing model

  

Source: Boppana, Rajendra V. - Department of Computer Science, University of Texas at San Antonio

 

Collection: Computer Technologies and Information Sciences

 
29 Towards Userlevel Parallelism with Minimal Kernel Support Marisa Gil, Toni Corts, Angel Toribio, Nacho Navarro
 

Summary:  ­level threads control and ease multi­ threaded programming [COOP88]: forking and joining of threads... applications from the UNIX Environment The original SPLASH programs use a number of UNIX processes accessing... a shared address space. The applications assign the work between the processes statically. All the programs

  

Source: Navarro, Nacho - Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya

 

Collection: Computer Technologies and Information Sciences

 
30 Integrated SharedMemory and MessagePassing Communication in the Alewife Multiprocessor
 

Summary:  programs and resulting performance numbers lead us to one of our primary conclusions, namely... .2.1 Performance of Shared­Memory Programs . . . . . . . . . . . . . . 203 6.2.2 Performance of Message... ­Passing Programs . . . . . . . . . . . . . . 204 6.2.3 Integration of Message Passing and Shared Memory

  

Source: Kubiatowicz, John D. - Department of Electrical Engineering and Computer Sciences, University of California at Berkeley

 

Collection: Computer Technologies and Information Sciences

 
31 Appeared in ASPLOS-VI Proceedings, Oct 1994 1 Dynamic Memory Disambiguation Using the Memory Con ict Bu er
 

Summary:  store load depen- dences. Correct program execution is ensured by the memory con ict bu er and repair... scheduling model can be achieved for both non-numerical and numerical programs. 1 Introduction A compile... be determined accurately at compile time. Because mem- ory dependences often occur on program critical paths

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign; Mahlke, Scott A. - Department of Electrical Engineering and Computer Science, University of Michigan

 

Collection: Computer Technologies and Information Sciences

 
32 Reducing Cache Misses in Numerical Applications Using Data Relocation and Prefetching
 

Summary:  paper. Index terms ­ Cache conflicts, data copying, data relocation, program optimization, software... that are discussed, and even more encouraging experimental results. Overlap of program execution with DRP, high... asynchronously with the CPU by buffering DRP requests, combine to help fully overlap program execution and DRP

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
33 UnrollingBased Optimizations for Modulo Scheduling Daniel M. Lavery Wenmei W. Hwu
 

Summary:  in the IMPACT compiler. The perfor­ mance benefits of unrolling for five of the SPEC CFP92 programs are reported... programs spend the majority of their execution time in loops. It is often necessary for the sched­ uler... three can be modified by program transfor­ mations. This paper focuses on optimization of the loop 1

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
34 Applying AI Techniques to Requirements Engineering: The NATURE Prototype *
 

Summary:  representation; it should end with agreement on a well­understood and formally described specification. . AAAA... AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Foundation of Research and Technology, Hellas, Institute of Computer Science, Information Systems Laboratory

 

Collection: Computer Technologies and Information Sciences

 
35 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 9 Number 12
 

Summary:  through December positive anomalies. #12;AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAAAAAA... AAAA AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
36 temperatures Subroutine INDEXX
 

Summary:  AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: California at Los Angeles, University of - Department of Earth and Space Sciences, Argon Thermochronometry Project

 

Collection: Geosciences

 
37 How to Respond to Student Initiatives in Tutoring Farhana Shah Martha W. Evens
 

Summary:  processed by several different programs. The first program, the Computer Dialogue System [Li et al., 1992... is passed through another marking program that numbers it. For example K4­st­84­1 in the following sentence... : 1 This work was supported by the Cognitive Science Program, Office of Naval Research ...

  

Source: Indiana University - Center for Research on Concepts and Cognition

 

Collection: Multidisciplinary Databases and Resources

 
38 AUTOMATIONOFLINEARANDNONLINEARCONTROL SYSTEMSDESIGN BYEVOLUTIONARYCOMPUTATION
 

Summary:  algorithm based evolution programs to transform the non­NP problems to NP­complete problems... ­ sign, Evolutionarycomputing, Evolution programs, Linear control systems, Nonlinear control systems 1... ­ AAAA AAAA AAAA AAAA AAAA ...

  

Source: Glasgow, University of - Centre for Systems and Control

 

Collection: Engineering

 
39 Includes 1997 Spring Summary HISTORICAL CLIMATOLOGY SERIES 4-7
 

Summary:  for Spring 1997. #12;AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
40 Superblock Formation Using Static Program Analysis Richard E. Hank Scott A. Mahlke Roger A. Bringmann John C. Gyllenhaal Wen-mei W. Hwu
 

Summary:  Superblock Formation Using Static Program Analysis Richard E. Hank Scott A. Mahlke Roger A... in the program. However, there are addi- tional opportunities to increase ILP along some ex- ecution sequences... . This paper presents a set of static program analysis heuristics used in the IMPACT compiler to identify

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign; Mahlke, Scott A. - Department of Electrical Engineering and Computer Science, University of Michigan

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
41 Uniprocessor Garbage Collection Techniques ? Paul R. Wilson
 

Summary:  short, by interleaving small amounts of collection work with program execution. Generational schemes... systems programmers must explicitly reclaim heap memory at some point in the program, by using a ``free... by the the running program. An object is considered garbage (and subject to reclamation) if it is not reachable

  

Source: Diwan, Amer - Department of Computer Science, University of Colorado at Boulder; Khedker, Uday - Department of Computer Science and Engineering, Indian Institute of Technology Bombay; Ramsey, Norman - Department of Computer Science, Tufts University

 

Collection: Computer Technologies and Information Sciences

 
42 AO EFICIENTE A PADR ~ COMPARTILHAMENTO EM SOFTWARE DSMS
 

Summary:  sincronizados, ou properly­labeled programs [GLL + 90], 'e formada por programas para os quais, entre qualquer

  

Source: Bianchini, Ricardo - Department of Computer Science, Rutgers University

 

Collection: Computer Technologies and Information Sciences

 
43 Maintenance of Discovered Association Rules in Large Databases: An Incremental Updating Technique \Lambda
 

Summary:  this program fragment to find L 0 k , the set of all large k­itemsets in the updated database, until either L 0... L j Number of potentially large itemsets N Number of items Table 1: Parameter Table. AAAA AAAA AAAA... AAAA AAAA AAAA ...

  

Source: Cheung, David Wai-lok - Department of Computer Science, Hong Kong University

 

Collection: Computer Technologies and Information Sciences

 
44 Accesses to the shared memory remain to be a major performance limitation in shared memory multiprocessors.
 

Summary:  there are almost Figure 6. General reference composition of the application programs. AAAA AA AA AA AA AAAAAA AA... program with respect to the choice coherence mechanisms. We identify four conceptual workload parameters... The shared memory paradigm of programming parallel applications for multiprocessors ...

  

Source: Jantsch, Axel - Department of Microelectronics and Information Technology & School of Information and Communication Technology, Royal Institute of Technology (KTH)

 

Collection: Computer Technologies and Information Sciences

 
45 JULY 1997 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 9 Number 7
 

Summary:  normal. #12;AAAA AAAA AAAAAAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA... AAAAAAAAAAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
46 To appear in ASPLOSV Conference Proceedings, October 1992 1 Sentinel Scheduling for VLIW and Superscalar Processors
 

Summary:  execution is to accu­ rately detect and report all program execution errors at the time of occurrence... and re­ porting exceptions are required to identify program execu­ tion errors at the time of occurrence... and (2) I will not cause an exception that alters the execution result of the program when BR is taken

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
47 Hierarchical Storage Systems for OnDemand Video Servers, Chan & Tobagi . Motivation and objective of the research
 

Summary:  Hierarchical Storage Systems for On­Demand Video Servers, Chan & Tobagi AAAA AAAA AAAA AAAA AAAA... AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Tobagi, Fouad - Department of Electrical Engineering, Stanford University

 

Collection: Engineering

 
48 Three Architectural Models for Compiler-Controlled Speculative Execution
 

Summary:  of Illinois, Urbana- Champaign, Illinois, 61801. 1 #12;1 Introduction For non-numeric programs, there is insu... is mispredicted, executing the instruction should not alter the behavior of the program. Dynamically scheduled... which terminates the program nor incorrectly overwrite a value when the branch is mispredicted. Various

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign; Mahlke, Scott A. - Department of Electrical Engineering and Computer Science, University of Michigan

 

Collection: Computer Technologies and Information Sciences

 
49 Effective Compiler Support for Predicated Execution Using the Hyperblock
 

Summary:  technique for dealing with conditional branches in application programs. How­ ever, there are several... of eliminating conditional branches from a program to utilize predicated execution support is referred to as if... ­ pendences in the code. If­conversion can eliminate all non­ loop backward branches from a program

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
50 ATLAS INDETNO085 25 January 1995
 

Summary:  : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 135 7.8 Program... : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 184 11.3 The module prototyping program in 1995... . : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 184 11.4 The Barrel Sector Prototype ...

  

Source: Lawrence Berkeley National Laboratory, ATLAS Silicon Strips

 

Collection: Fission and Nuclear Technologies

 
51 Multiphase Flow and Transport Modeling in Heterogeneous Porous Media: Challenges and
 

Summary:  : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 135 7.8 Program... : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 184 11.3 The module prototyping program in 1995... . : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 184 11.4 The Barrel Sector Prototype ...

  

Source: Trangenstein, John A. - Department of Mathematics, Duke University

 

Collection: Mathematics ; Computer Technologies and Information Sciences

 
52 Achieving Balance in Software Engineering Curricula Bruce Lo: blo@scu.edu.au
 

Summary:  a reasonable program in software engineering, particularly at the undergraduate level [3]. Even when consensus... standard system design and programming skills are still considered essential, new developments... approach . the programming approach . the tool­kit approach . the process modelling approach

  

Source: Watson, Richard - Department of Mathematics and Computing, University of Southern Queensland

 

Collection: Computer Technologies and Information Sciences

 
53 MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLIGENCE LABORATORY
 

Summary:  by the Multidisciplinary Research Program of the University Initiative (MURI). #12; 1 Introduction 1.1 Multistable Percepts... Reported Phases Black = Rightward Gray = Leftward AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Massachusetts Institute of Technology (MIT), Center for Biological and Computational Learning; Oliva, Aude - Department of Brain and Cognitive Science, Massachusetts Institute of Technology (MIT); Poggio, Tomaso - Center for Biological and Computational Learning, Massachusetts Institute of Technology (MIT)

 

Collection: Biology and Medicine ; Computer Technologies and Information Sciences

 
54 Reducing PE/Memory Traffic in Multiprocessors by The Difference Coding of Memory Addresses*
 

Summary:  stores only one address per PE/MU pair. It is possible that some aspect of program or system behavior... complete addresses been sent. The traces were from four shared memory programs, each use 64 PEs and a 32... using 64 bit processors. Although it will be quite some time before programs use every addresses

  

Source: Koppelman, David M. - Department of Electrical and Computer Engineering, Louisiana State University

 

Collection: Computer Technologies and Information Sciences

 
55 JUNE 1997 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 9 Number 6
 

Summary:  normal. #12;AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA A A A A AAAAA AAAA AAAA AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
56 PARALLEL MOLECULAR DYNAMICS TECHNIQUES FOR THE SIMULATION OF ANISOTROPIC SYSTEMS
 

Summary:  many programs, have provided a painless route to parallelisation. In addition, the development... of message passing software that allows purpose-written parallel programs to be ported across many di erent... produce a series of communication routines that could be called from within a program to carry out message

  

Source: Wilson, Mark R. - Department of Chemistry, University of Durham

 

Collection: Chemistry

 
57 JUNE 1996 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 8 Number 6
 

Summary:  -June 1996 ranked 15th coolest (see Table 1). #12;AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAAAAAA AAAA AAAAAAAA... AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAAAAAA AAAA AAAAAAAA AA AA AA AAA A AA AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAA... AAAAAAAAAAAA AAAAAAAA AAAA AAAA AAAAAAAAAAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
58 ProfileAssisted Instruction Scheduling William Y. Chen Scott A. Mahlke Nancy J. Warter Sadun Anik Wenmei W. Hwu
 

Summary:  scenarios in the program. However, there are additional opportunities to increase instruction... identifies these important execution scenarios in a program. In this paper, two major categories of profile... typically takes into account the constraints imposed by all possible execution scenarios of the program

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
59 Searching for B 0 ! J= with the
 

Summary:  . The analysis method proceeds as follows. simulation program used to model accep- tances of B + ! J= K + and B 0... reconstruction eÆciency is studied in the CDF environment by introducing a data based Monte Carlo program

  

Source: Glasgow, University of - Department of Physics and Astronomy, Particle Physics Experimental Group

 

Collection: Physics

 
60 Optimizing Parallel Bitonic Sort MIHAI FLORIN IONESCU
 

Summary:  Parallel Computer : : : : : : : : : : : : : : : : : : : : 74 5.2 The Split­C Programming Language... C. Split­C provides a machine independent #12; 4 SPMD programming model and is supported on a large... by the data layout. #12; 15 AAAA AAAA AAAA AAAA ...

  

Source: California at Santa Barbara, University of - Department of Computer Science, Four Eyes Lab.

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
61 MARCH 1996 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 8 Number 3
 

Summary:  . F. 5 #12;Figure 1 Figure 2 6 #12;Figure 3 Figure 4 7 #12;Figure 5 Figure 6 8 #12;AAAA AAAAAAAAAAAA... AAAA AAAAAAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAAAAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
62 Network Reliability: Models, Measures and Analysis
 

Summary:  the assignment of each route to particular network components is known. AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA... AAAA AAAA AAAA AAAA ...

  

Source: László, Jereb - Department of Telecommunications, Budapest University of Technology and Economics

 

Collection: Engineering

 
63 Improving Depth Perception in 3D Interfaces with Sound
 

Summary:  ............................................................................. 78 Appendix E Sample SAS Program

  

Source: Waterloo, University of - Computer Graphics Lab.

 

Collection: Computer Technologies and Information Sciences

 
64 Object Interactions as First Class Objects: From Design to Implementation
 

Summary:  programming language allow programmers to implement object interactions as first class objects by using... Activity Translate 1 performers AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Baumgartner, Gerald - Department of Computer Science, Louisiana State University

 

Collection: Computer Technologies and Information Sciences

 
65 The Superblock: An E ective Technique for VLIW and Superscalar Compilation
 

Summary:  the parallel hardware. However, ILP within basic blocks is extremely limited for control-intensive programs. We... into account a variety of architectural features. Index terms - code scheduling, control-intensive programs... than two for control-intensive programs Jouppi and Wall1989; Schuette and Shen 1991; Smithet al. 1989

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
66 page 40 of 40 [40]. Margo Seltzer, Keith A. Smith, Hari Balakrishnan, Jacqueline Chang, Sara McMains, Venkata Padmanabhan.
 

Summary:  to Programming. Microsoft Press, Redmond, Washington, 1990. [30]. Microsoft Corporation. Microsoft Windows NT... ­Mapped Caches.'' Proceedings of the Sixth International Conference on Architectural Sup­ port for Programming... . Pentium Family User's Manual, Volume 3: Architecture and Programming Manual. Intel Cor­ poration, ...

  

Source: Seltzer, Margo I.- School of Engineering and Applied Sciences, Harvard University

 

Collection: Computer Technologies and Information Sciences

 
67 A version of this paper will appear in The Proceedings of the 15th ACM Symposium on Operating System Principles. The Measured Performance of
 

Summary:  an entry point, thereby permitting user­level programs to call them directly. We used the latter method... in the operating system. . Exec --- latency to load and run a trivial program. We tested Exec with both static... Mosaic code base. We used a separate counter­control program to start, stop, and record counter values

  

Source: Seltzer, Margo I.- School of Engineering and Applied Sciences, Harvard University

 

Collection: Computer Technologies and Information Sciences

 
68 The following paper was originally published in the Proceedings of the USENIX 1996 Annual Technical Conference
 

Summary:  a remote server crash will cause a client crash as well, since all programs that have some of their pages... swapped out (including programs like init and system daemons) will not be able to continue execution... protocols are used [26]. 3.2 The Remote Memory Server The server is a user level program listening

  

Source: Newhall, Tia - Computer Science Department, Swarthmore College

 

Collection: Computer Technologies and Information Sciences

 
69 Implementation of a Reliable Remote Memory Pager Evangelos P. Markatos and George Dramitinos \Lambda
 

Summary:  as well, since all programs that have some of their pages swapped out (including programs like init... protocols are used [26]. 3.2 The Remote Memory Server The server is a user level program listening... applications include GAUSS, a gaus­ sian elimination, QSORT, a quicksort program, FFT, a Fast­Fourier ...

  

Source: Katevenis, Manolis G.H. - Institute of Computer Science, Foundation of Research and Technology, Hellas; Markatos, Evangelos P. - Department of Computer Science, University of Crete

 

Collection: Computer Technologies and Information Sciences

 
70 JANUARY 1996 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 8 Number 1
 

Summary:  . F. 5 #12;Figure 1 Figure 2 6 #12;Figure 3 Figure 4 7 #12;AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAA... AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAA AAA A AAA A AAA A AAAA AAAAAAAAAAAA... AAAA AAAAAAAAAAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
71 ORNL/TM-12743 Engineering Physics and Mathematics Division
 

Summary:  degrade the performance of a parallel program. The performance of the current generation of Intel's CFS... /O subroutines called in an application program from the NX version to the DONIO version (leaving the parameters... -passing programming models for ease of programming and optimal performance. #12;- 4 - ...

  

Source: D'Azevedo, Ed - Computer Science and Mathematics Division, Oak Ridge National Laboratory

 

Collection: Mathematics ; Computer Technologies and Information Sciences

 
72 Quasi-Delay Insensitive Bus for Fully Asynchronous Systems
 

Summary:  " or "composability" principle [vBer93]. Analogous to software engineering, in which object oriented programming... AAA AAA AAA AAA AA A A AA AAA AAA AAA AAA AAA AAA AAA AAA AAA AAA AAA AAA AAA AAA A AAAA AAAA AAAA... AAAA AAAA AAAA ...

  

Source: Cheung, Peter Y. K. - Department of Electrical and Electronic Engineering, Imperial College, London

 

Collection: Computer Technologies and Information Sciences

 
73 AUGUST 1996 Includes Summer Report
 

Summary:  ) periods ranked in the middle third of the historical distribution (Table 1). #12;AAAAAAAAAAAA AAAA... AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAAAAAA AAAA AAAA AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAAAAAA... AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
74 c Copyright by YOJI YAMADA, 1995 DATA RELOCATION AND PREFETCHING FOR PROGRAMS WITH LARGE DATA SETS
 

Summary:  c Copyright by YOJI YAMADA, 1995 #12;DATA RELOCATION AND PREFETCHING FOR PROGRAMS WITH LARGE DATA... , Illinois #12;DATA RELOCATION AND PREFETCHING FOR PROGRAMS WITH LARGE DATA SETS YOJI YAMADA, Ph... , additional instructions decompress the modi ed data and relocate it back to the original program arrays

  

Source: Hwu, Wen-mei W. - Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign

 

Collection: Computer Technologies and Information Sciences

 
75 This paper describes the first software implementa-tion of an MPEG video decoder that runs at realtime
 

Summary:  - cantly speed up several critical parts of the MPEG de- coder program, especially in the IDCT and motion... . Inv. Quantize IDCT Motion Comp. Display 0 50 100 150 200 250 AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Lee, Ruby B. - Department of Electrical Engineering, Princeton University

 

Collection: Engineering

 
76 CaseBased Design for Tablet Formulation ? Susan Craw 1 , Nirmalie Wiratunga 1 , and Ray Rowe 2
 

Summary:  T and X removed. Figure 7 #12; 366 Susan Craw et al. Sheet4 AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA... AAAA AAAA AAAA ...

  

Source: Wiratunga, Nirmalie - School of Computing, Robert Gordon University

 

Collection: Computer Technologies and Information Sciences

 
77 On engineering support for business process modelling and redesign1
 

Summary:  with a database and a program (Jacobson, 1995) which is not the way a business process is generally build... be labelled uniquely to ensure consistent assignment of behaviour. AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Pires, Luís Ferreira - Department of Computer Science, Universiteit Twente

 

Collection: Computer Technologies and Information Sciences

 
78 5 Numerical Examples We use the following convention for the different solvers employed
 

Summary:  . p=1.0 100.0 50.0 50.0 100.0 AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA... ...

  

Source: Coutinho, Alvaro L. G. A. - Department of Civil Engineering, COPPE/Federal University of Rio de Janeiro

 

Collection: Engineering

 
79 Scientific databases have recently become a challenging research area for a number of reasons: 1) the amount of data stored in scientific
 

Summary:  ­data must be included: ffl Input and output data object types. ffl Programming language used, necessary... Information System and NSF's High Performance Computing and Communications Program. Based on our view... Research Plan of the U.S. Global Change Research Program,'' 1990. 6. Committee on Global Change

  

Source: Ward, Matthew - Department of Computer Science, Worcester Polytechnic Institute

 

Collection: Computer Technologies and Information Sciences

 
80 Micromuse, Management & Netcool Management & Netcool
 

Summary:  Vision program ­ although OnVision has some fundamental architecture misfits. 4.2.1 The Tactical Complexity... .e. program in the correlation about fault relationships based on operator knowledge). So, the Inclusive... , and Command/Post. Inclusive Management products tend to be development environments that can be programmed

  

Source: Carleton University, Department of Systems and Computer Engineering, Network Management Laboratory

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
81 Improving the Standardization Process "From Courtship Dance to Lawyering
 

Summary:  and the resultant recommendations may guide the development of a training program for chairs and participants... Davis Jr., Text Description and Programming Languages, X3V1.8 · William Rinehuls, Operational Management... Members AAAA AAAAAAAA AAAA AAAAAAAA AAAA AAAAAAAA ...

  

Source: Spring, Michael B. - School of Information Sciences, University of Pittsburgh

 

Collection: Computer Technologies and Information Sciences

 
82 Uniprocessor Garbage Collection Techniques? Paul R. Wilson
 

Summary:  short, by interleaving small amounts of collection work with program execution. Generational schemes... systems programmers must explicitly reclaim heap memory at some point in the program, by using a \free... by the the running program. An object is considered garbage (and subject to reclamation) if it is not reachable

  

Source: Tolmach, Andrew - Department of Computer Science, Portland State University

 

Collection: Computer Technologies and Information Sciences

 
83 MARCH 1997 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 9 Number 3
 

Summary:  ;AAAA AAAA AAAAAAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAAAAAA... AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
84 Multimedia Storage Servers: A Tutorial D. James Gemmell
 

Summary:  discussed in [1]. x #12; CONTIGUOUS PLACEMENT CONSTRAINED PLACEMENT LOG­STRUCTURED PLACEMENT AAAA AAAA AAAA... AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Vin, Harrick M. - Department of Computer Sciences, University of Texas at Austin

 

Collection: Computer Technologies and Information Sciences

 
85 FEBRUARY 1995 Includes Winter Summary
 

Summary:  #12;Figure 5 Figure 6 10 #12;AAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAA AAAA AAAAAAAA AAAAAAAA... AAAAAAAA AAAAAAAA AAAA AAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAA AAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAA... ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
86 Hidden Markov Model Analysis of Motifs in Steroid Dehydrogenases and their Homologs
 

Summary:  string. These motif­only strings were analyzed using the protein parsimony analysis program from... the conserved tyrosine and lysine residues at the catalytic site. #12; 6 3 RESULTS AAAA AAAA AAAA AAAA AAAA AAAA... AAAA ...

  

Source: Bailey, Timothy L. - Institute for Molecular Bioscience, University of Queensland

 

Collection: Biotechnology

 
87 APRIL 1996 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 8 Number 4
 

Summary:  . F. 5 #12;Figure 1 Figure 2 6 #12;Figure 3 Figure 4 7 #12;Figure 5 Figure 6 8 #12;AAAA AAAAAAAAAAAA... AAAA AAAAAAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAAAAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
88 View Volume Culling Using a Probabilistic Caching Scheme
 

Summary:  at Berkeley, Report No. UCB/CSD 92/708. Figure 1 ­ Bivariate Gaussian Distribution AAAA AAAA AAAA AAAA AAAA... AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Slater, Mel - Department of Computer Science, University College London

 

Collection: Computer Technologies and Information Sciences

 
89 JULY 1996 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 8 Number 7
 

Summary:  began (Table 1). #12;AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAAAAAA AAAA AAAA AAAA AAAA... AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
90 STRUCTURE OF THE SUN'S CORE: EVOLUTIONAL AND SEISMOLOGICAL CONSTRAINTS V. A. Baturin (V.A.Baturin@qmw.ac.uk)
 

Summary:  ---753. AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA ...

  

Source: Moscow University, Sternberg Astronomical Institute, Solar Studies Group

 

Collection: Physics

 
91 MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLIGENCE LABORATORY
 

Summary:  programs. To switch between parallel threads, a conventional processor must spill and reload thread... and efficient sequential program performance. The NSF holds more live data than conventional register files... execution of some sequential and parallel programs by 9% to 17% over alternative register file organiza

  

Source: Dietz, Henry G. "Hank" - Department of Electrical and Computer Engineering, University of Kentucky

 

Collection: Computer Technologies and Information Sciences

 
92 TRANSFERRING ASSEMBLY SKILLS TO ROBOTS: LEARNING FORCE SENSORY PATTERNS AND SKILLS FROM HUMAN
 

Summary:  . Volz Robots are distinguished from other automated machines by their capability of being programmed... : : : : : : : : : : : : : : : : : : : : : 18 C. Robot Programming by Demonstration : : : : : : : : : : : : : : 19 IV METHODOLOGY... not performed previously, the robot may need some quick instruction or task refinement (i.e., ...

  

Source: Skubic, Marjorie - Departments of Computer Science & Electrical and Computer Engineering, University of Missouri-Columbia

 

Collection: Engineering

 
93 NOVEMBER 1994 Includes Autumn Summary
 

Summary:  #12;AAAAAAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAAAAAA AAAA AAAA AAAAAAAA AAAA AAAAAAAA AAAA... AAAA AAAA AAAAAAAA AAAA AAAAAAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
94 IEEE Journal on Selected Areas in Communications, 1993. vol 11(9): pp 1404-1414 Policy Hierarchies for Distributed Systems Management
 

Summary:  in practice need further refinement, so as to be expressed in terms of well-defined actions. AAAA AAAA AAAA... AAAA AAAAAAAA AAAAAAAA AAAAAAAAAAAA AAAAAAAA AAAA AAAAAAAA AAAA AAAA AAAAAAAA AAAA AAAA ...

  

Source: Moffett, Jonathan - Faculty of Mathematics, Computing and Technology, Open University

 

Collection: Computer Technologies and Information Sciences

 
95 NOVEMBER 1995 Includes Autumn Summary
 

Summary:  ;Figure 1 Figure 2 9 #12;Figure 3 Figure 4 10 #12;Figure 5 Figure 6 11 #12;AAAA AAAA AAAA AAAA AAAA AAAA... AAAA AAAA AAAA AAAA AAAAAAAA AAAAAAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
96 Reflection and Action Under Scarce Resources: Theoretical Principles and Empirical Study \Lambda
 

Summary:  .g., the number of hypotheses and pieces of evidence). #12; AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA... AAAA ...

  

Source: Horvitz, Eric - Adaptive Systems and Interaction Group, Microsoft Research

 

Collection: Computer Technologies and Information Sciences

 
97 APRIL 1997 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 9 Number 4
 

Summary:  while about nine percent of the country was much wetter than normal. #12;AAAA AAAA AAAA AAAA AAAA AAAA... AAAA AAAA AAAA AAAAAAAA AAAA AAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences

 
98 Copyright 1999, Society of Petroleum Engineers Inc. This paper was prepared for presentation at the 1999 SPE Annual Technical Conference and
 

Summary:  . This paper was selected for presentation by an SPE Program Committee following review of information

  

Source: Stanford University Petroleum Research Institute - D Innovation in Well Testing

 

Collection: Fossil Fuels

 
99 Re ection and Action Under Scarce Resources: Theoretical Principles and Empirical Study
 

Summary:  of the problem (e.g., the number of hypotheses and pieces of evidence). #12;AAAA AAAA AAAA AAAA AAAA AAAA AAAA... AAAA AAAA AAAA AAAA AAAA ...

  

Source: Horvitz, Eric - Adaptive Systems and Interaction Group, Microsoft Research

 

Collection: Computer Technologies and Information Sciences

 
100 SEPTEMBER 1997 HISTORICAL CLIMATOLOGY SERIES 4-7 Volume 9 Number 9
 

Summary:  while nearly ten percent of the country was much wetter than normal. #12;AAAA AAAA AAAA AAAA AA AA AA AA... AAAA AAAAAAAAAAAA AAAA AAAAAAAAAAAA AAAA AAAAAAAA AAAA AAAAAAAAAAAA AAAA AAAAAAAAAAAA ...

  

Source: 

 

Collection: Environmental Sciences and Ecology ; Geosciences


Page:   1  2  3  4  5