Sciweavers

3497 search results - page 91 / 700
» Making Distributed Applications Robust
Sort
View
NAACL
2004
15 years 3 months ago
Robust Reading: Identification and Tracing of Ambiguous Names
A given entity, representing a person, a location or an organization, may be mentioned in text in multiple, ambiguous ways. Understanding natural language requires identifying whe...
Xin Li, Paul Morie, Dan Roth
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
15 years 2 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
CIDR
2007
116views Algorithms» more  CIDR 2007»
15 years 3 months ago
Life beyond Distributed Transactions: an Apostate's Opinion
Many decades of work have been invested in the area of distributed transactions including protocols such as 2PC, Paxos, and various approaches to quorum. These protocols provide t...
Pat Helland
SENSYS
2009
ACM
15 years 9 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
157
Voted
CVPR
2009
IEEE
16 years 9 months ago
Memory-based particle filter for face pose tracking robust under complex dynamics
A novel particle filter, the Memory-based Particle Filter (M-PF), is proposed that can visually track moving objects that have complex dynamics. We aim to realize robustness aga...
Dan Mikami (NTT), Kazuhiro Otsuka (NTT), Junji YAM...