Sciweavers

3836 search results - page 676 / 768
» Optimizing the Use of High Performance Software Libraries
Sort
View
SC
2005
ACM
15 years 9 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
105
Voted
KES
2005
Springer
15 years 9 months ago
Lightweight Agent Framework for Camera Array Applications
This paper describes a lightweight middleware agent framework (LAF) for coordinating a large array of computers with attached cameras to construct high resolution video-rate image ...
Lee Middleton, Sylvia C. Wong, Michael O. Jewell, ...
SIGIR
2004
ACM
15 years 9 months ago
Retrieval evaluation with incomplete information
This paper examines whether the Cranfield evaluation methodology is robust to gross violations of the completeness assumption (i.e., the assumption that all relevant documents wi...
Chris Buckley, Ellen M. Voorhees
115
Voted
ICRA
2003
IEEE
115views Robotics» more  ICRA 2003»
15 years 9 months ago
Evolution of the NASA/DARPA robonaut control system
The NASA/DARPA Robonaut system is evolving from a purely teleoperator controlled anthropomorphic robot towards a humanoid system with multiple control pathways. Robonaut is a huma...
Myron A. Diftler, Robert Platt Jr., C. J. Culbert,...
SAC
2003
ACM
15 years 9 months ago
Validation of Code-Improving Transformations for Embedded Systems
Programmers of embedded systems often develop software in assembly code due to inadequate support from compilers and the need to meet critical speed and/or space constraints. Many...
Robert van Engelen, David B. Whalley, Xin Yuan