Sciweavers

1448 search results - page 189 / 290
» Deadlock Detection in Distributed Systems
Sort
View
MM
2006
ACM
124views Multimedia» more  MM 2006»
15 years 10 months ago
Blazingly fast image copyright enforcement
Many photo agencies use the web to sell access to their image collections. Despite significant security measures, images may be stolen and distributed, making it necessary to det...
Herwig Lejsek, Friðrik Heiðar Ásmun...
HICSS
2003
IEEE
128views Biometrics» more  HICSS 2003»
15 years 10 months ago
Sensor Fusion and Complex Data Analysis for Predictive Maintenance
An essential step toward the development of an intelligent substation is to provide self-diagnosing capability at the equipment level. Transformers, circuit breakers and other sub...
Rahmat Shoureshi, Tim Norick, David Linder, John W...
GLOBECOM
2009
IEEE
15 years 8 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
135
Voted
ICPP
1999
IEEE
15 years 9 months ago
An Offline Algorithm for Dimension-Bound Analysis
The vector-clock size necessary to characterize causality in a distributed computation is bounded by the dimension of the partial order induced by that computation. In an arbitrar...
Paul A. S. Ward
ISORC
2003
IEEE
15 years 10 months ago
Enhancing Time Triggered Scheduling with Value Based Overload Handling and Task Migration
Time triggered methods provide deterministic behaviour suitable for critical real-time systems. They perform less favourably, however, if the arrival times of some activities are ...
Jan Carlson, Tomas Lennvall, Gerhard Fohler