Sciweavers

593 search results - page 55 / 119
» Performance Modeling: Understanding the Past and Predicting ...
Sort
View
DAIS
2006
15 years 1 months ago
Using Speculative Push for Unnecessary Checkpoint Creation Avoidance
Abstract. This paper discusses a way of incorporating speculation techniques into Distributed Shared Memory (DSM) systems with checkpointing mechanism without creating unnecessary ...
Arkadiusz Danilecki, Michal Szychowiak
ICS
2010
Tsinghua U.
15 years 9 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
ICDCSW
2007
IEEE
15 years 3 months ago
Predictive Directional Greedy Routing in Vehicular Ad hoc Networks
VANETs (Vehicle Ad hoc NETworks) are highly mobile wireless ad hoc networks targeted to support vehicular safety and other commercial applications. Conventional routing protocols ...
Jiayu Gong, Cheng-Zhong Xu, James Holle
CHI
1997
ACM
15 years 4 months ago
Cognitive Modeling Reveals Menu Search is Both Random and Systematic
To understand how people search for a known target item in an unordered pull-down menu, this research presents cognitive models that vary serial versus parallel processing of menu...
Anthony J. Hornof, David E. Kieras
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
14 years 10 months ago
On optimal AUV track-spacing for underwater mine detection
— This work addresses the task of designing the optimal survey route that an autonomous underwater vehicle (AUV) should take in mine countermeasures (MCM) operations. It is assum...
David P. Williams