Sciweavers

1146 search results - page 191 / 230
» Design of a multimedia processor based on metrics computatio...
Sort
View
91
Voted
IEEEPACT
2002
IEEE
15 years 2 months ago
Eliminating Exception Constraints of Java Programs for IA-64
Java exception checks are designed to ensure that any faulting instruction causing a hardware exception does not terminate the program abnormally. These checks, however, impose so...
Kazuaki Ishizaki, Tatsushi Inagaki, Hideaki Komats...
SIGMOD
2010
ACM
310views Database» more  SIGMOD 2010»
15 years 2 months ago
The DataPath system: a data-centric analytic processing engine for large data warehouses
Since the 1970’s, database systems have been “compute-centric”. When a computation needs the data, it requests the data, and the data are pulled through the system. We belie...
Subi Arumugam, Alin Dobra, Christopher M. Jermaine...
EGITALY
2006
14 years 11 months ago
Easy Access to Huge 3D Models of Works of Art
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...
88
Voted
MOBIHOC
2008
ACM
15 years 9 months ago
Toward stochastic anatomy of inter-meeting time distribution under general mobility models
Recent discovery of the mixture (power-law and exponential) behavior of inter-meeting time distribution of mobile nodes presents new challenge to the problem of mobility modeling ...
Han Cai, Do Young Eun
IWCMC
2006
ACM
15 years 3 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras