Sciweavers

2468 search results - page 491 / 494
» Collaborative architecture design and evaluation
Sort
View
FAST
2008
14 years 12 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
ACMACE
2008
ACM
14 years 11 months ago
When RFIDs meet artist's painting
This work challenges the conventional art experience. It brings together the fields of art, science, and software integration. The goal was to create a new kind of painting based ...
Olivier Haberman, Romain Pellerin, Ugo Haberman
80
Voted
ATAL
2008
Springer
14 years 11 months ago
Using multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson
86
Voted
IM
2007
14 years 11 months ago
Compass: Cost of Migration-aware Placement in Storage Systems
— We investigate methodologies for placement and migration of logical data stores in virtualized storage systems leading to optimum system configuration in a dynamic workload sc...
Akshat Verma, Upendra Sharma, Rohit Jain, Koustuv ...
73
Voted
WICON
2008
14 years 11 months ago
Channel assignment with partially overlapping channels in wireless mesh networks
Many efforts have been devoted to maximizing the network throughput with limited channel resources in multi-radio multi-channel wireless mesh networks. It has been believed that t...
Yong Ding, Yi Huang, Guo-Kai Zeng, Li Xiao