Sciweavers

1474 search results - page 17 / 295
» Exploiting Locality in a TMS
Sort
View
DCOSS
2011
Springer
13 years 11 months ago
Construction of connected dominating sets in large-scale MANETs exploiting self-stabilization
—Available algorithms for the distributed construction of connected dominating sets in mobile ad hoc networks are inapplicable or suffer from a high complexity. This is mainly du...
Stefan Unterschutz, Volker Turau
AAAI
1994
15 years 1 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...
HPDC
1999
IEEE
15 years 4 months ago
Dodo: A User-level System for Exploiting Idle Memory in Workstation Clusters
In this paper, we present the design and implementation of Dodo, an e cient user-level system for harvesting idle memory in o -the-shelf clusters of workstations. Dodo enables dat...
Samir Koussih, Anurag Acharya, Sanjeev Setia
ICASSP
2011
IEEE
14 years 3 months ago
Multipath model and exploitation in through-the-wall radar and urban sensing
We establish the multipath model which encompasses the target and its multipath “ghosts” in urban and through-thewall synthetic aperture radar (SAR). The focused downrange and...
Pawan Setlur, Moeness G. Amin, Fauzia Ahmad
ICIP
2006
IEEE
16 years 1 months ago
Exploiting Spatial Redundancy in Pixel Domain Wyner-Ziv Video Coding
Distributed video coding is a recent paradigm that enables a flexible distribution of the computational complexity between the encoder and the decoder building on top of distribut...
Alan Trapanese, Catarina Brites, Fernando Pereira,...