Sciweavers

668 search results - page 127 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
OOPSLA
2004
Springer
15 years 3 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
82
Voted
MIR
2010
ACM
255views Multimedia» more  MIR 2010»
15 years 2 months ago
Sharing of baseball event through social media
As real-time broadcasting services are becoming more popular, many people are sharing live events with remote users. Despite the success of real-time broadcasting services, a numb...
Hogun Park, Sun-Bum Youn, Eugene Hong, Changhyeon ...
77
Voted
ICRA
2003
IEEE
144views Robotics» more  ICRA 2003»
15 years 2 months ago
Error-tolerant execution of complex robot tasks based on skill primitives
— This paper presents a general approach to specify and execute complex robot tasks considering uncertain environments. Robot tasks are defined by a precise definition of socal...
Ulrike Thomas, Bernd Finkemeyer, Torsten Krög...
VRML
2003
ACM
15 years 2 months ago
3D virtual clothing: from garment design to web3d visualization and simulation
One of the major challenges in Computer Graphics concerns the 3D representation and physically-based simulation of garments. In our research, we are working closely with the texti...
Luca Chittaro, Demis Corvaglia
ICS
2003
Tsinghua U.
15 years 2 months ago
miNI: reducing network interface memory requirements with dynamic handle lookup
Recent work in low-latency, high-bandwidth communication systems has resulted in building user–level Network InControllers (NICs) and communication abstractions that support dir...
Reza Azimi, Angelos Bilas