نتایج جستجو برای: basic control structure
تعداد نتایج: 2938707 فیلتر نتایج به سال:
Both power and performance are important design parameters of the present day processors. This paper explores an integrated software and circuit level technique to reduce leakage power in L1 instruction caches of high performance microprocessors, by eliminating basic blocks from the cache, as soon as they are dead. The effect of this dead block elimination in cache on both the power consumption...
This article takes stock of the basic notions of Information Structure (IS). It first provides a general characterization of IS — following Chafe (1976) — within a communicative model of Common Ground (CG), which distinguishes between CG content and CG management. IS is concerned with those features of language that concern the local CG. Second, this paper defines and discusses the notions of F...
A phenomenological theory, designiued herein as the unified glass theor;', is presented. The theory introduces the concept of order-disorder transitions and liquid-model transformation within a gla^s network and was found to be useful in elucidating and predicting structural behavior. The degree of order and the structural characteristics of a glass system were represented by three existing mod...
in new management approaches, in the organizations with inflexible structure, existing of red tapes and interruptions caused by limitations and also non-compliance with environmental changes, create demotivation among staff. with regard to the influence of job motivational potential and its relationship to the type of organizational structure( enabling and dissuasive), the goal of this research...
IS educators often struggle with curriculum issues including timeliness and completeness of the curriculum. While model curricula suggest that programming courses should be a part of an IS undergraduate degree, little guidance is offered as to the order and timing of these courses. A longitudinal survey of students in programming courses was used to assess whether sequence or concurrency explai...
An access control method with subject-object key and time stamp is proposed. In this method each subject and object is assigned one key respectively. The key of a subject or an object can be used to reveal the access rights to the objects depending on the value of time stamp. The method achieves full dynamism. The operations of changing an access right, inserting a subject or an object and dele...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید