• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,630,534
Next 10 →

Multiple Case Studies to Enhance Project-Based Learning in a Computer Architecture Course

by Ra Martínez-monés, Eduardo Gómez-sánchez, Yannis A. Dimitriadis, Iván M. Jorrín-abellán, Bartolomé Rubia-avi, Guillermo Vega-gorgojo
"... emphasize the use of recurrent concepts and system design/evaluation through projects and case studies in the curriculum of Computer and Electrical Engineering. In addition, efficient teamwork, autonomy, and initiative are commonly required qualifications for a professional in this field. Project-ba ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
. This paper describes a multiple-case-study project design that has been applied to a computer architecture course for four years. After systematically evaluating the experience, the authors conclude that students achieve a deep learning of the concepts required in their own case study, while they are able

The Architecture of Cognition

by John R. Anderson , 1983
"... Spanning seven orders of magnitude: a challenge for ..."
Abstract - Cited by 1580 (40 self) - Add to MetaCart
Spanning seven orders of magnitude: a challenge for

Foundations for the Study of Software Architecture

by Dewayne E. Perry, Alexander L. Wolf - ACM SIGSOFT SOFTWARE ENGINEERING NOTES , 1992
"... The purpose of this paper is to build the foundation for software architecture. We first develop an intuition for software architecture by appealing to several well-established architectural disciplines. On the basis of this intuition, we present a model of software architec-ture that consists of th ..."
Abstract - Cited by 784 (35 self) - Add to MetaCart
The purpose of this paper is to build the foundation for software architecture. We first develop an intuition for software architecture by appealing to several well-established architectural disciplines. On the basis of this intuition, we present a model of software architec-ture that consists

A Security Architecture for Computational Grids

by Ian Foster , Carl Kesselman, Gene Tsudik, Steven Tuecke , 1998
"... State-of-the-art and emerging scientific applications require fast access to large quantities of data and commensurately fast computational resources. Both resources and data are often distributed in a wide-area network with components administered locally and independently. Computations may involve ..."
Abstract - Cited by 569 (49 self) - Add to MetaCart
involve hundreds of processes that must be able to acquire resources dynamically and communicate e#ciently. This paper analyzes the unique security requirements of large-scale distributed (grid) computing and develops a security policy and a corresponding security architecture. An implementation

An introduction to software architecture

by David Garlan, Mary Shaw - Advances in Software Engineering and Knowledge Engineering , 1993
"... ..."
Abstract - Cited by 697 (35 self) - Add to MetaCart
Abstract not found

SOAR: An architecture for general intelligence

by John E. Laird, Allen Newell, Paul S. Rosenbloom - ARTIFICIAL INTELLIGENCE , 1987
"... ..."
Abstract - Cited by 1029 (66 self) - Add to MetaCart
Abstract not found

Towards an Active Network Architecture

by David L. Tennenhouse, David J. Wetherall - Computer Communication Review , 1996
"... Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" -- program fragments that are executed at each network router/switch they traverse. Active architectures permit ..."
Abstract - Cited by 492 (7 self) - Add to MetaCart
a massive increase in the sophistication of the computation that is performed within the network. They will enable new applications, especially those based on application-specific multicast, information fusion, and other services that leverage network-based computation and storage. Furthermore

The Protection of Information in Computer Systems

by Jerome H. Saltzer, Michael D. Schroeder , 1975
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections ..."
Abstract - Cited by 815 (2 self) - Add to MetaCart
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main

The 4+1 view model of architecture

by Philippe B. Kruchten - IEEE SOFTWARE , 1995
"... The 4+1 View Model organizes a description of a software architecture using five concurrent views, each of which addresses a specific set of concerns. Architects capture their design decisions in four views and use the fifth view to illustrate and validate them. ..."
Abstract - Cited by 553 (4 self) - Add to MetaCart
The 4+1 View Model organizes a description of a software architecture using five concurrent views, each of which addresses a specific set of concerns. Architects capture their design decisions in four views and use the fifth view to illustrate and validate them.

An application-specific protocol architecture for wireless networks

by Wendi Beth Heinzelman , 2000
"... ..."
Abstract - Cited by 1217 (18 self) - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 1,630,534
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University