Sciweavers

1791 search results - page 196 / 359
» Behavioral Operations
Sort
View
CLUSTER
2002
IEEE
15 years 9 months ago
I/O Analysis and Optimization for an AMR Cosmology Application
In this paper, we investigate the data access patterns and file I/O behaviors of a production cosmology application that uses the adaptive mesh refinement (AMR) technique for it...
Jianwei Li, Wei-keng Liao, Alok N. Choudhary, Vale...
WMCSA
2002
IEEE
15 years 9 months ago
Composing Pervasive Data Using iQL
The emergence of pervasive networked data sources, such as web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programmi...
Norman H. Cohen, Hui Lei, Paul Castro, John S. Dav...
ICPR
2000
IEEE
15 years 8 months ago
Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method
2. Obtain the gray-levelgradient magnitude. 3. Derive the threshold surface by deforming the original image gray-level surface. 4. The thresholdsurface interpolation. 5. Segmentati...
C. C. Leung, Francis H. Y. Chan, Paul C. K. Kwok, ...
ICRA
2000
IEEE
136views Robotics» more  ICRA 2000»
15 years 8 months ago
Recent Progress in Local and Global Traversability for Planetary Rovers
Autonomous planetary rovers operating in vast unknown environments must operate efficiently because of size, power and computing limitations. Recently, we have developed a rover c...
Sanjiv Singh, Reid G. Simmons, Trey Smith, Anthony...
SRDS
2000
IEEE
15 years 8 months ago
Deterministic Scheduling for Transactional Multithreaded Replicas
One way to implement a fault-tolerant a service is by replicating it at sites that fail independently. One of the replication techniques is active replication where each request i...
Ricardo Jiménez-Peris, Marta Patiño-...