Sciweavers

1982 search results - page 331 / 397
» Designing Efficient Distributed Algorithms Using Sampling Te...
Sort
View
158
Voted
ATVA
2006
Springer
114views Hardware» more  ATVA 2006»
15 years 6 months ago
Selective Approaches for Solving Weak Games
Abstract. Model-checking alternating-time properties has recently attracted much interest in the verification of distributed protocols. While checking the validity of a specificati...
Malte Helmert, Robert Mattmüller, Sven Schewe
CGF
2008
200views more  CGF 2008»
15 years 2 months ago
Deep Opacity Maps
We present a new method for rapidly computing shadows from semi-transparent objects like hair. Our deep opacity maps method extends the concept of opacity shadow maps by using a d...
Cem Yuksel, John Keyser
CORR
2008
Springer
128views Education» more  CORR 2008»
15 years 2 months ago
Electricity Demand and Energy Consumption Management System
This project describes the electricity demand and energy consumption management system and its application to Southern Peru smelter. It is composted of an hourly demand-forecastin...
Juan Ojeda Sarmiento
127
Voted
CONEXT
2009
ACM
15 years 3 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
131
Voted
SASO
2007
IEEE
15 years 8 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...