Sciweavers

4418 search results - page 874 / 884
» A Formal Approach to Computer Systems Requirements Documenta...
Sort
View
78
Voted
DSN
2003
IEEE
15 years 2 months ago
Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques
The presence of physical obstacles and radio interference results in the so called “shadow regions” in wireless networks. When a mobile station roams into a shadow region, it ...
Dongyan Chen, Sachin Garg, Chandra M. R. Kintala, ...
PPOPP
2003
ACM
15 years 2 months ago
Using generative design patterns to generate parallel code for a distributed memory environment
A design pattern is a mechanism for encapsulating the knowledge of experienced designers into a re-usable artifact. Parallel design patterns reflect commonly occurring parallel co...
Kai Tan, Duane Szafron, Jonathan Schaeffer, John A...
ICPP
1997
IEEE
15 years 1 months ago
The Affinity Entry Consistency Protocol
In this paper we propose a novel software-only distributed sharedmemory system (SW-DSM), the Affinity Entry Consistency (AEC) protocol. The protocol is based on Entry Consistency ...
Cristiana Bentes Seidel, Ricardo Bianchini, Claudi...
102
Voted
CVDB
2005
ACM
14 years 11 months ago
Optimizing progressive query-by-example over pre-clustered large image databases
The typical mode for querying in an image content-based information system is query-by-example, which allows the user to provide an image as a query and to search for similar imag...
Anicet Kouomou Choupo, Laure Berti-Equille, Annie ...
DEBS
2008
ACM
14 years 11 months ago
Event-based constraints for sensornet programming
We propose a sensornet programming model based on declarative spatio-temporal constraints on events only, not sensors. Where previous approaches conflate events and sensors becaus...
Jie Mao, John Jannotti, Mert Akdere, Ugur Ç...