Sciweavers

8655 search results - page 1337 / 1731
» Challenges for Trusted Computing
Sort
View
IFIP
2004
Springer
15 years 9 months ago
Ad Hoc Routing with Early Unidirectionality Detection and Avoidance
This paper is motivated by the observation that current research in ad hoc networks mostly assumes a physically flat network architecture with the nodes having homogeneous charact...
Young-Bae Ko, Sung-Ju Lee, Jun-Beom Lee
KES
2004
Springer
15 years 9 months ago
The Correspondence Problem in Topological Metric Mapping - Using Absolute Metric Maps to Close Cycles
In Simultaneous Localisation and Mapping (SLAM) the correspondence problem, specifically detecting cycles, is one of the most difficult challenges for an autonomous mobile robot. ...
Margaret E. Jefferies, Michael C. Cosgrove, Jesse ...
LCPC
2004
Springer
15 years 9 months ago
HiLO: High Level Optimization of FFTs
As computing platforms become more and more complex, the task of optimizing performance critical codes becomes more challenging. Recently, more attention has been focused on automa...
Nick Rizzolo, David A. Padua
MIDDLEWARE
2004
Springer
15 years 9 months ago
Ganymed: Scalable Replication for Transactional Web Applications
Data grids, large scale web applications generating dynamic content and database service providing pose significant scalability challenges to database engines. Replication is the ...
Christian Plattner, Gustavo Alonso
NPC
2004
Springer
15 years 9 months ago
The HKUST Frog Pond - A Case Study of Sensory Data Analysis
Many sensor network applications are data-centric, and data analysis plays an important role in these applications. However, it is a challenging task to find out what specific prob...
Wenwei Xue, Bingsheng He, Hejun Wu, Qiong Luo
« Prev « First page 1337 / 1731 Last » Next »