Sciweavers

20638 search results - page 3943 / 4128
» Network Computing
Sort
View
IAT
2010
IEEE
15 years 13 days ago
Using Negotiation to Reduce Redundant Autonomous Mobile Program Movements
Distributed load managers exhibit thrashing where tasks are repeatedly moved between locations due to incomplete global load information. This paper shows that systems of Autonomou...
Natalia Chechina, Peter King, Phil Trinder
129
Voted
ICASSP
2010
IEEE
15 years 13 days ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ISI
2010
Springer
15 years 11 days ago
Social media and social reality
Social Media provide an exciting and novel view into social phenomena. The vast amounts of data that can be gathered from the Internet coupled with massively parallel supercomputer...
William N. Reynolds, Marta S. Weber, Robert M. Far...
MICRO
2010
IEEE
167views Hardware» more  MICRO 2010»
15 years 11 days ago
Erasing Core Boundaries for Robust and Configurable Performance
Single-thread performance, reliability and power efficiency are critical design challenges of future multicore systems. Although point solutions have been proposed to address thes...
Shantanu Gupta, Shuguang Feng, Amin Ansari, Scott ...
131
Voted
QEST
2010
IEEE
15 years 10 days ago
Fortuna: Model Checking Priced Probabilistic Timed Automata
We introduce Fortuna, the first tool for model checking priced probabilistic timed automata (PPTAs). Fortuna can handle the combination of real-time, probabilistic and cost feature...
Jasper Berendsen, David N. Jansen, Frits W. Vaandr...
« Prev « First page 3943 / 4128 Last » Next »