Sciweavers

1030 search results - page 87 / 206
» Happenings
Sort
View
IEEESCC
2007
IEEE
15 years 5 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
IPPS
2007
IEEE
15 years 5 months ago
Stochastic Approach to Scheduling Multiple Divisible Tasks on a Heterogeneous Distributed Computing System
Heterogeneity has been considered in scheduling, but without taking into account the temporal variation of completion times of the sub-tasks for a divisible, independent task. In ...
Ankur Kamthe, Soo-Young Lee
IPPS
2007
IEEE
15 years 5 months ago
Single IP Address Cluster for Internet Servers
Operating a cluster on a single IP address is required when the cluster is used to provide certain Internet services. This paper proposes SAPS, a new method to assign a single IP ...
Hiroya Matsuba, Yutaka Ishikawa
IROS
2007
IEEE
176views Robotics» more  IROS 2007»
15 years 5 months ago
Controlling a team of ground robots via an aerial robot
— We consider the task of controlling a large team of nonholonomic ground robots with an unmanned aerial vehicle in a decentralized manner that is invariant to the number of grou...
Nathan Michael, Jonathan Fink, Vijay Kumar
ISCA
2007
IEEE
192views Hardware» more  ISCA 2007»
15 years 5 months ago
Analysis of redundancy and application balance in the SPEC CPU2006 benchmark suite
The recently released SPEC CPU2006 benchmark suite is expected to be used by computer designers and computer architecture researchers for pre-silicon early design analysis. Partia...
Aashish Phansalkar, Ajay Joshi, Lizy Kurian John