Sciweavers

11017 search results - page 2164 / 2204
» Closure Systems and their Structure
Sort
View

Publication
323views
14 years 10 months ago
Reconstruction of snow and ice surfaces using multiple view  vision techniques
In this paper we describe a vision system for reconstructing the relative structure of snow and ice surfaces. This effort is one step toward the long-term goal of rendering absol...
GOWRI SOMANATH , ROHITH MV , CATHLEEN A. GEIGER ...
GI
2008
Springer
14 years 10 months ago
A Novel Conceptual Model for Accessing Distributed Data and Applications, as well as Devices
: As data and services are increasingly distributed in the network, rather than stored in a fixed location, one can imagine a scenario in which the Personal Computer, intended as a...
Lucia Terrenghi, Thomas Lang
DAC
2010
ACM
14 years 10 months ago
Instruction cache locking using temporal reuse profile
The performance of most embedded systems is critically dependent on the average memory access latency. Improving the cache hit rate can have significant positive impact on the per...
Yun Liang, Tulika Mitra
SIGCOMM
2010
ACM
14 years 10 months ago
Rethinking iBGP routing
The Internet is organized as a collection of administrative domains, known as Autonomous Systems (ASes). These ASes interact through the Border Gateway Protocol (BGP) that allows ...
Iuniana M. Oprescu, Mickael Meulle, Steve Uhlig, C...
ADHOC
2007
144views more  ADHOC 2007»
14 years 10 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
« Prev « First page 2164 / 2204 Last » Next »