Sciweavers

1474 search results - page 93 / 295
» Exploiting Locality in a TMS
Sort
View
DSN
2004
IEEE
15 years 7 months ago
Efficient Byzantine-Tolerant Erasure-Coded Storage
This paper describes a decentralized consistency protocol for survivable storage that exploits local data versioning within each storage-node. Such versioning enables the protocol...
Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger,...
PATMOS
2000
Springer
15 years 7 months ago
Data-Reuse and Parallel Embedded Architectures for Low-Power, Real-Time Multimedia Applications
Exploitation of data re-use in combination with the use of custom memory hierarchy that exploits the temporal locality of data accesses may introduce significant power savings, esp...
Dimitrios Soudris, Nikolaos D. Zervas, Antonios Ar...
IMAMS
2007
157views Mathematics» more  IMAMS 2007»
15 years 5 months ago
Regularity Criteria for the Topology of Algebraic Curves and Surfaces
In this paper, we consider the problem of analysing the shape of an object defined by polynomial equations in a domain. We describe regularity criteria which allow us to determine...
Lionel Alberti, Bernard Mourrain
TJS
1998
101views more  TJS 1998»
15 years 3 months ago
Compiler Support for Array Distribution on NUMA Shared Memory Multiprocessors
Management of program data to improve data locality and reduce false sharing is critical for scaling performanceon NUMA shared memorymultiprocessors. We use HPF-like data decomposi...
Tarek S. Abdelrahman, Thomas N. Wong
ICIAP
2009
ACM
15 years 1 months ago
On the Quantitative Estimation of Short-Term Aging in Human Faces
Facial aging has been only partially studied in the past and mostly in a qualitative way. This paper presents a novel approach to the estimation of facial aging aimed to the quanti...
Marcos Ortega, Linda Brodo, Manuele Bicego, Massim...