Sciweavers

1474 search results - page 31 / 295
» Exploiting Locality in a TMS
Sort
View
ICS
1992
Tsinghua U.
15 years 3 months ago
Optimizing for parallelism and data locality
Previous research has used program transformation to introduce parallelism and to exploit data locality. Unfortunately,these twoobjectives have usuallybeen considered independentl...
Ken Kennedy, Kathryn S. McKinley
ICC
2009
IEEE
163views Communications» more  ICC 2009»
15 years 6 months ago
Virtual Calibration for RSSI-Based Indoor Localization with IEEE 802.15.4
— Localization systems based on Received Signal Strength Indicator (RSSI) exploit fingerprinting (based on extensive signal strength measurements) to calibrate the system paramet...
Paolo Barsocchi, Stefano Lenzi, Stefano Chessa, Ga...
PPPJ
2004
ACM
15 years 5 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
ICASSP
2010
IEEE
15 years 1 days ago
On distance reconstruction for sensor network localization
Sensor localization typically exploits distance measurements to infer sensor positions with respect to known anchor nodes. Missing or unreliable measurements for specific nodes c...
Phillip A. Regalia, Jing Wang
GREC
2009
Springer
15 years 3 months ago
A Performance Characterization Algorithm for Symbol Localization
In this paper we present an algorithm for performance characterization of symbol localization systems. This algorithm is aimed to be a more “reliable” and “open” solution t...
Mathieu Delalandre, Jean-Yves Ramel, Ernest Valven...