Sciweavers

3639 search results - page 566 / 728
» Provenance as Dependency Analysis
Sort
View
ISCAS
2005
IEEE
155views Hardware» more  ISCAS 2005»
15 years 6 months ago
Hyperblock formation: a power/energy perspective for high performance VLIW architectures
— Architectures based on Very Long Instruction Word (VLIW) processors are an optimal choice in the attempt to obtain high performance levels in mobile devices. The effectiveness ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
ISPAN
2005
IEEE
15 years 6 months ago
Safety and QoS-Aware Management of Heterogeneous Sensor Networks
— Recently, we have proposed ANSWER: AutoNomouS Wireless sEnsor netwoRk as a service platform whose mission is to provide dependable information services to in-situ mobile users ...
Mohamed F. Younis, Waleed A. Youssef, Mohamed Elto...
101
Voted
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 6 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
78
Voted
ACMACE
2005
ACM
15 years 6 months ago
Playmakers in multiplayer game communities: their importance and motivations for participation
In many game-like open-ended multiplayer communities, the success of the game, and well-being of the community, depends on the efforts of certain individuals who arrange resources...
Antti Salovaara, Mikael Johnson, Kalle Toiskallio,...
105
Voted
ACMSE
2005
ACM
15 years 6 months ago
Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system
In this paper, we describe recent work in developing a peer-topeer collaborative environment. The study examines various locking mechanisms/policies by adjusting the granularity o...
Jon A. Preston, Sushil K. Prasad