Sciweavers

297 search results - page 20 / 60
» Heap Reference Analysis Using Access Graphs
Sort
View
MSS
2000
IEEE
89views Hardware» more  MSS 2000»
15 years 6 months ago
Access Coordination of Tertiary Storage for High Energy Physics Applications
We describe a real implementation of a software component that manages caching of files from a tertiary storage management system to a large disk cache developed for use in the a...
Luis M. Bernardo, Arie Shoshani, Alex Sim, Henrik ...
ASSETS
2000
ACM
15 years 6 months ago
Constructing sonified haptic line graphs for the blind student: first steps
Line graphs stand as an established information visualisation and analysis technique taught at various levels of difficulty according to standard Mathematics curricula. Blind indi...
Rameshsharma Ramloll, Wai Yu, Stephen A. Brewster,...
PERCOM
2006
ACM
16 years 1 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
SMI
2010
IEEE
165views Image Analysis» more  SMI 2010»
14 years 12 months ago
Designing a Topological Modeler Kernel: A Rule-Based Approach
In this article, we present a rule-based language dedicated to topological operations, based on graph transformations. Generalized maps are described as a particular class of graph...
Thomas Bellet, Mathieu Poudret, Agnès Arnou...
ADHOC
2007
137views more  ADHOC 2007»
15 years 2 months ago
"MeshUp": Self-organizing mesh-based topologies for next generation radio access networks
The phenomenal growth in wireless technologies has brought about a slew of new services. Incumbent with the new technology is the challenge of providing flexible, reconfigurable...
Samik Ghosh, Kalyan Basu, Sajal K. Das