Sciweavers

318 search results - page 36 / 64
» On the Computational Power of 1-Deterministic and Sequential...
Sort
View
ISVLSI
2005
IEEE
101views VLSI» more  ISVLSI 2005»
15 years 3 months ago
eWatch: Context Sensitive System Design Case Study
In this paper, we introduce a novel context sensitive system design paradigm. Multiple sensors/ computational architecture, in the form of our eWatch device, is used to infer the ...
Asim Smailagic, Daniel P. Siewiorek, Uwe Maurer, A...
ICDCSW
2006
IEEE
15 years 3 months ago
Fuzzy Trust for Peer-to-Peer Systems
Peer-to-peer (P2P) systems are based upon the cooperative interactions of member peers. Typically, peers are both autonomous and self-interested, meaning that there is no hierarch...
Nathan Griffiths, Kuo-Ming Chao, Muhammad Younas
IPTPS
2004
Springer
15 years 3 months ago
Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays
Structured peer-to-peer (p2p) overlay networks provide a decentralized, self-organizing substrate for distributed applicad support powerful abstractions such as distributed hash t...
Alan Mislove, Peter Druschel
ASAP
2000
IEEE
184views Hardware» more  ASAP 2000»
15 years 2 months ago
Tradeoff Analysis and Architecture Design of a Hybrid Hardware/Software Sorter
Sorting long sequences of keys is a problem that occurs in many different applications. For embedded systems, a uniprocessor software solution is often not applicable due to the l...
Marcus Bednara, Oliver Beyer, Jürgen Teich, R...
IJHPCA
2007
114views more  IJHPCA 2007»
14 years 9 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima