Sciweavers

12257 search results - page 2117 / 2452
» Analysis of Algorithms
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
An adaptive stabilization framework for distributed hash tables
Distributed Hash Tables (DHT) algorithms obtain good lookup performance bounds by using deterministic rules to organize peer nodes into an overlay network. To preserve the invaria...
Gabriel Ghinita, Yong Meng Teo
IROS
2006
IEEE
239views Robotics» more  IROS 2006»
15 years 10 months ago
Development of a Facial Expression Imitation System
— In the last decade, face analysis, e.g. face recognition, face detection, face tracking and facial expression recognition, is a very lively and expanding research field. As com...
Do Hyoung Kim, Sung-Uk Jung, Kwang Ho An, Hui Sung...
MICRO
2006
IEEE
74views Hardware» more  MICRO 2006»
15 years 10 months ago
Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware
Although processor design verification consumes ever-increasing resources, many design defects still slip into production silicon. In a few cases, such bugs have caused expensive...
Smruti R. Sarangi, Abhishek Tiwari, Josep Torrella...
ROBIO
2006
IEEE
120views Robotics» more  ROBIO 2006»
15 years 10 months ago
Event Based Methodology for SuperMedia Enhanced Teleoperation
- SuperMedia provides human operators rich environmental information, thus providing telepresence and enhances efficiency of operation. However, coupling human with the remote envi...
Yang Liu, Amit Goradia, Yonghui Xue, Ning Xi
SKG
2006
IEEE
15 years 10 months ago
Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems
Upper bound constraints are often set when complex scientific or business processes are modelled as grid workflow specifications. However, many existing processes such as climate ...
Jinjun Chen, Yun Yang
« Prev « First page 2117 / 2452 Last » Next »