Sciweavers

790 search results - page 120 / 158
» Limits of Work-Stealing Scheduling
Sort
View
IPPS
2006
IEEE
15 years 6 months ago
Performance analysis of Java concurrent programming: a case study of video mining system
As multi/many core processors become prevalent, programming language is important in constructing efficient parallel applications. In this work, we build a multithreaded video min...
Wenlong Li, Eric Li, Ran Meng, Tao Wang, Carole Du...
141
Voted
ISLPED
2006
ACM
106views Hardware» more  ISLPED 2006»
15 years 6 months ago
Maximizing the lifetime of embedded systems powered by fuel cell-battery hybrids
—Fuel cell (FC) is a viable alternative power source for portable applications; it has higher energy density than traditional Li-ion battery and thus can achieve longer lifetime ...
Jianli Zhuo, Chaitali Chakrabarti, Naehyuck Chang,...
PPPJ
2006
ACM
15 years 6 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...
139
Voted
AAAIDEA
2005
IEEE
15 years 6 months ago
Design and Evaluation of Diffserv Functionalities in the MPLS Edge Router Architecture
—Differentiated Service (DiffServ) in combination with Multi-Protocol Label Switching (MPLS) is a promising technology in converting the best-effort Internet into a QoS-capable n...
Wei-Chu Lai, Kuo-Ching Wu, Ting-Chao Hou
124
Voted
AICCSA
2005
IEEE
164views Hardware» more  AICCSA 2005»
15 years 6 months ago
Efficient aggregation of delay-constrained data in wireless sensor networks
Recent years have witnessed a growing interest in the application of wireless sensor networks in unattended environments. Nodes in such applications are equipped with limited ener...
Kemal Akkaya, Mohamed F. Younis, Moustafa Youssef