Sciweavers

1471 search results - page 213 / 295
» Composing concurrency control
Sort
View
STORAGESS
2005
ACM
15 years 3 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
ISCA
2011
IEEE
258views Hardware» more  ISCA 2011»
14 years 1 months ago
A case for heterogeneous on-chip interconnects for CMPs
Network-on-chip (NoC) has become a critical shared resource in the emerging Chip Multiprocessor (CMP) era. Most prior NoC designs have used the same type of router across the enti...
Asit K. Mishra, Narayanan Vijaykrishnan, Chita R. ...
VLDB
1994
ACM
84views Database» more  VLDB 1994»
15 years 1 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung
CVPR
2004
IEEE
15 years 12 months ago
Probabilistic Parameter-Free Motion Detection
We propose an original probabilistic parameter-free method for the detection of independently moving objects in an image sequence. We apply a probabilistic perceptual principle, t...
Frédéric Cao, Patrick Bouthemy, Thom...
ICIP
2006
IEEE
15 years 11 months ago
Video Surveillance using Dynamic Configuration of Mutiple Active Cameras
In this paper, we present a coordinated video surveillance system that can minimize the spatial limitation and can precisely extract the 3D position of objects. To do this, our sy...
Nyoun Kim, Ig-Jae Kim, Hyoung-Gon Kim