Sciweavers

1845 search results - page 138 / 369
» Computing the Angularity Tolerance
Sort
View
JNW
2008
123views more  JNW 2008»
15 years 3 months ago
An Application-Specific Reliable Data Transfer Protocol in Wireless Sensor Networks
- We present a new protocol for reliable data transfer in time-critical applications with zero tolerance for data loss in wireless sensor networks which uses less time and fewer me...
Damayanti Datta, Sukhamay Kundu
150
Voted
I3D
2010
ACM
16 years 1 months ago
Cascaded Light Propagation Volumes for Real-Time Indirect Illumination
This paper introduces a new scalable technique for approximating indirect illumination in fully dynamic scenes for real-time applications, such as video games. We use lattices and...
Anton Kaplanyan, Carsten Dachsbacher
148
Voted
CCGRID
2006
IEEE
15 years 10 months ago
Proposal of MPI Operation Level Checkpoint/Rollback and One Implementation
With the increasing number of processors in modern HPC(High Performance Computing) systems, there are two emergent problems to solve. One is scalability, the other is fault tolera...
Yuan Tang, Graham E. Fagg, Jack Dongarra
109
Voted
DAC
2005
ACM
16 years 4 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
SOSP
2009
ACM
16 years 25 days ago
Upright cluster services
The UpRight library seeks to make Byzantine fault tolerance (BFT) a simple and viable alternative to crash fault tolerance for a range of cluster services. We demonstrate UpRight ...
Allen Clement, Manos Kapritsos, Sangmin Lee, Yang ...