Sciweavers

1845 search results - page 184 / 369
» Computing the Angularity Tolerance
Sort
View
152
Voted
SAC
2009
ACM
15 years 10 months ago
NECTAR: a DTN routing protocol based on neighborhood contact history
There are a number of scenarios where connectivity is intermittent, and a given destination may not be reachable at the moment a message is sent. Networks with these characteristi...
Etienne C. R. de Oliveira, Célio V. N. de A...
136
Voted
GPC
2007
Springer
15 years 9 months ago
Fault Management in P2P-MPI
We present in this paper the recent developments done in P2P-MPI, a grid middleware, concerning the fault management, which covers fault-tolerance for applications and fault detect...
Stéphane Genaud, Choopan Rattanapoka
138
Voted
IPPS
2006
IEEE
15 years 9 months ago
Coordinated checkpoint from message payload in pessimistic sender-based message logging
Execution of MPI applications on Clusters and Grid deployments suffers from node and network failure that motivates the use of fault tolerant MPI implementations. Two category tec...
M. Aminian, Mohammad K. Akbari, Bahman Javadi
127
Voted
PRDC
2006
IEEE
15 years 9 months ago
SEVA: A Soft-Error- and Variation-Aware Cache Architecture
As SRAM devices are scaled down, the number of variation-induced defective memory cells increases rapidly. Combination of ECC, particularly SECDED, with a redundancy technique can...
Luong Dinh Hung, Masahiro Goshima, Shuichi Sakai
140
Voted
ACCV
2006
Springer
15 years 9 months ago
A Novel Robust Statistical Method for Background Initialization and Visual Surveillance
In many visual tracking and surveillance systems, it is important to initialize a background model using a training video sequence which may include foreground objects. In such a c...
Hanzi Wang, David Suter