Sciweavers

957 search results - page 114 / 192
» Addition Chain Heuristics
Sort
View
137
Voted
FMICS
2010
Springer
15 years 3 months ago
A Study of Shared-Memory Mutual Exclusion Protocols Using CADP
Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurr...
Radu Mateescu, Wendelin Serwe
GLOBECOM
2010
IEEE
15 years 2 months ago
Peer-to-Peer Storage Systems: A Practical Guideline to be Lazy
Distributed and peer-to-peer storage systems are foreseen as an alternative to the traditional data centers and in-house backup solutions. In the past few years many peerto-peer st...
Frédéric Giroire, Julian Monteiro, S...
158
Voted
ICIP
2010
IEEE
15 years 2 months ago
Virtual jewel rendering for augmented reality environments
Virtual Mirrors are augmented reality applications that capture a viewer's image and add 2D or 3D overlaid virtual elements, such as cloth patterns, or replace existing piece...
Peter Eisert, Christian Jacquemin, Anna Hilsmann
INFOCOM
2010
IEEE
15 years 2 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu
133
Voted
DSD
2010
IEEE
133views Hardware» more  DSD 2010»
15 years 2 months ago
Area and Speed Oriented Implementations of Asynchronous Logic Operating under Strong Constraints
Asynchronous circuit implementations operating under strong constraints (DIMS, Direct Logic, some of NCL gates, etc.) are attractive due to: 1) regularity; 2) combined implementati...
Igor Lemberski, Petr Fiser