Sciweavers

1022 search results - page 120 / 205
» Challenges for Constraint Programming in Networking
Sort
View
TVCG
2008
96views more  TVCG 2008»
15 years 2 months ago
Hand Motion Prediction for Distributed Virtual Environments
We use our hands to manipulate objects in our daily life. The hand is capable of accomplishing diverse tasks such as pointing, gripping, twisting, and tearing. However, there is no...
Addison Chan, Rynson W. H. Lau, Lewis W. F. Li
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 4 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
TWC
2008
113views more  TWC 2008»
15 years 2 months ago
Capacity of opportunistic routing in multi-rate and multi-hop wireless networks
Abstract-- Opportunistic routing (OR) copes with the unreliable transmissions by exploiting the broadcast nature of the wireless medium and spatial diversity of the multi-hop wirel...
Kai Zeng, Wenjing Lou, Hongqiang Zhai
ISCA
1997
IEEE
108views Hardware» more  ISCA 1997»
15 years 7 months ago
The SGI Origin: A ccNUMA Highly Scalable Server
The SGI Origin 2000 is a cache-coherent non-uniform memory access (ccNUMA) multiprocessor designed and manufactured by Silicon Graphics, Inc. The Origin system was designed from t...
James Laudon, Daniel Lenoski
IFIP
2007
Springer
15 years 9 months ago
Global Supply Chain Control
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...
Heidi C. Dreyer, Ottar Bakås, Erlend Alfnes,...