In this paper, we investigate the data access patterns and file I/O behaviors of a production cosmology application that uses the adaptive mesh refinement (AMR) technique for it...
Jianwei Li, Wei-keng Liao, Alok N. Choudhary, Vale...
The emergence of pervasive networked data sources, such as web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programmi...
Norman H. Cohen, Hui Lei, Paul Castro, John S. Dav...
2. Obtain the gray-levelgradient magnitude. 3. Derive the threshold surface by deforming the original image gray-level surface. 4. The thresholdsurface interpolation. 5. Segmentati...
C. C. Leung, Francis H. Y. Chan, Paul C. K. Kwok, ...
Autonomous planetary rovers operating in vast unknown environments must operate efficiently because of size, power and computing limitations. Recently, we have developed a rover c...
Sanjiv Singh, Reid G. Simmons, Trey Smith, Anthony...
One way to implement a fault-tolerant a service is by replicating it at sites that fail independently. One of the replication techniques is active replication where each request i...