Sciweavers

1474 search results - page 8 / 295
» Exploiting Locality in a TMS
Sort
View
NCA
2007
IEEE
15 years 3 months ago
Exploiting Host Name Locality for Reduced Stretch P2P Routing
Structured P2P networks are a promising alternative for engineering new distributed services and for replacing existing distributed services like DNS. Providing competitive perfor...
Gert Pfeifer, Christof Fetzer, Thomas Hohnstein
101
Voted
FLAIRS
2007
14 years 12 months ago
Exploiting MindStorms NXT: Mapping and Localization Projects for the AI Course
1 This paper describes two major student projects for the artificial intelligence course – Mapping using Bayesian filter and Monte Carlo Localization. These projects are also sui...
Myles F. McNally, Frank Klassner, Christopher Cont...
CF
2006
ACM
15 years 3 months ago
Exploiting locality to ameliorate packet queue contention and serialization
Packet processing systems maintain high throughput despite relatively high memory latencies by exploiting the coarse-grained parallelism available between packets. In particular, ...
Sailesh Kumar, John Maschmeyer, Patrick Crowley
DEXAW
2005
IEEE
125views Database» more  DEXAW 2005»
14 years 11 months ago
Exploiting Local Popularity to Prune Routing Indices in Peer-to-Peer Systems
Routing in unstructured peer-to-peer systems relies either on broadcasting (also called flooding) or on routing indices. An approach using routing indices is only scalable if the...
Stéphane Bressan, Achmad Nizar Hidayanto, Z...
91
Voted
ICCD
2005
IEEE
127views Hardware» more  ICCD 2005»
15 years 6 months ago
Using Scratchpad to Exploit Object Locality in Java
Performance of modern computers is tied closely to the effective use of cache because of the continually increasing speed discrepancy between processors and main memory. We demons...
Carl S. Lebsack, J. Morris Chang