Sciweavers

5790 search results - page 795 / 1158
» Distributed programming with distributed authorization
Sort
View
SSS
2009
Springer
107views Control Systems» more  SSS 2009»
15 years 9 months ago
A Self-stabilizing Algorithm for Graph Searching in Trees
Graph searching games have been extensively studied in the past years. The graph searching problem involves a team of searchers who are attempting to capture a fugitive moving alon...
Rodica Mihai, Morten Mjelde
CF
2009
ACM
15 years 9 months ago
Strategies for dynamic memory allocation in hybrid architectures
Hybrid architectures combining the strengths of generalpurpose processors with application-specific hardware accelerators can lead to a significant performance improvement. Our ...
Peter Bertels, Wim Heirman, Dirk Stroobandt
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 9 months ago
Peer-assisted packet loss repair for IPTV video multicast
Emerging IPTV technology uses source-specific IP multicast to deliver TV programs to the end-users. To provide timely and reliable services over the error-prone DSL access networ...
Zhi Li, Xiaoqing Zhu, Ali C. Begen, Bernd Girod
ICPP
2008
IEEE
15 years 9 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
124
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
A Cluster-Based Multiuser Cooperative Network
Abstract— A novel cluster-based coherent multi-user (MU) relaying system is proposed, where a number of source/destination pairs communicate concurrently over the same physical c...
Celal Esli, Armin Wittneben