Sciweavers

986 search results - page 132 / 198
» On distributing symmetric streaming computations
Sort
View
PACT
2001
Springer
15 years 6 months ago
Fusion of Concurrent Invocations of Exclusive Methods
Abstract. This paper describes a mechanism for “fusing” concurrent invocations of exclusive methods. The target of our work is object-oriented languages with concurrent extensi...
Yoshihiro Oyama, Kenjiro Taura, Akinori Yonezawa
ICPP
1998
IEEE
15 years 5 months ago
A memory-layout oriented run-time technique for locality optimization
Exploiting locality at run-time is a complementary approach to a compiler approach for those applications with dynamic memory access patterns. This paper proposes a memory-layout ...
Yong Yan, Xiaodong Zhang, Zhao Zhang
PPSN
2010
Springer
14 years 12 months ago
Mirrored Sampling and Sequential Selection for Evolution Strategies
This paper reveals the surprising result that a single-parent non-elitist evolution strategy (ES) can be locally faster than the (1+1)-ES. The result is brought about by mirrored s...
Dimo Brockhoff, Anne Auger, Nikolaus Hansen, Dirk ...
WOA
2010
14 years 11 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
MIDDLEWARE
2007
Springer
15 years 7 months ago
A piggybacking approach to reduce overhead in sensor network gossiping
Many wireless sensor network protocols are employing gossipbased message dissemination, where nodes probabilistically forward messages, to reduce message overhead. We are concerne...
Ercan Ucan, Nathanael Thompson, Indranil Gupta