Sciweavers

4744 search results - page 280 / 949
» Connected Computing
Sort
View
147
Voted
FPL
2007
Springer
99views Hardware» more  FPL 2007»
15 years 8 months ago
Disjoint Pattern Enumeration for Custom Instructions Identification
Extensible processors allow addition of application-specific custom instructions to the core instruction set architecture. These custom instructions are selected through an analys...
Pan Yu, Tulika Mitra
COORDINATION
2006
Springer
15 years 7 months ago
Using Lime to Support Replication for Availability in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) define a challenging computing scenario where access to resources is restrained by connectivity among hosts. Replication offers an opportunity to in...
Amy L. Murphy, Gian Pietro Picco
GC
2008
Springer
15 years 4 months ago
Domination in Graphs of Minimum Degree at least Two and Large Girth
We prove that for graphs of order n, minimum degree 2 and girth g 5 the domination number satisfies 1 3 + 2 3g n. As a corollary this implies that for cubic graphs of order n ...
Christian Löwenstein, Dieter Rautenbach
CHI
2007
ACM
16 years 4 months ago
Testing the technology: playing games with video conferencing
Video connections can establish a media space in which games may be played, just as people play games while collocated. Experiments with participants playing the game `Mafia'...
Archer L. Batcheller, Brian Hilligoss, Kevin Nam, ...
CAISE
2006
Springer
15 years 7 months ago
Community based Ubiquitous System Development in Multi-agent Environment
Ubiquitous system can be considered as the intelligent space, in which many kinds of component are connected by networks and also each component recognizes their connection and coo...
Youna Jung, Jungtae Lee, Minkoo Kim