Sciweavers

1566 search results - page 164 / 314
» Contification Using Dominators
Sort
View
ICPP
2006
IEEE
15 years 4 months ago
A PROactive Request Distribution (PRORD) Using Web Log Mining in a Cluster-Based Web Server
Widely adopted distributor-based systems forward user requests to a balanced set of waiting servers in complete transparency to the users. The policy employed in forwarding reques...
Heung Ki Lee, Gopinath Vageesan, Ki Hwan Yum, Eun ...
VLSI
2005
Springer
15 years 3 months ago
Pareto Points in SRAM Design Using the Sleepy Stack Approach
Leakage power consumption of current CMOS technology is already a great challenge. ITRS projects that leakage power consumption may come to dominate total chip power consumption a...
Jun-Cheol Park, Vincent John Mooney III
IFIP
2004
Springer
15 years 3 months ago
Selective Channel Scanning for Fast Handoff in Wireless LAN Using Neighbor Graph
: Handoff at the link layer 2 (L2) consists of three phases including scanning, authentication, and reassociation. Among the three phases, scanning is dominant in terms of time del...
Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Jae-Won ...
NIPS
1996
14 years 11 months ago
Predicting Lifetimes in Dynamically Allocated Memory
Predictions oflifetimesofdynamicallyallocated objects can be used to improve time and space e ciency of dynamic memory management in computer programs. Barrett and Zorn 1993] used...
David A. Cohn, Satinder P. Singh
CVPR
2009
IEEE
16 years 5 months ago
Manhattan-world Stereo
Multi-view stereo (MVS) algorithms now produce reconstructions that rival laser range scanner accuracy. However, stereo algorithms require textured surfaces, and therefore work ...
Brian Curless, Richard Szeliski, Steven M. Seitz, ...