Sciweavers

10633 search results - page 1908 / 2127
» Relating Distributed Objects
Sort
View
ICS
2005
Tsinghua U.
15 years 7 months ago
The implications of working set analysis on supercomputing memory hierarchy design
Supercomputer architects strive to maximize the performance of scientific applications. Unfortunately, the large, unwieldy nature of most scientific applications has lead to the...
Richard C. Murphy, Arun Rodrigues, Peter M. Kogge,...
ISRR
2005
Springer
118views Robotics» more  ISRR 2005»
15 years 7 months ago
A Provably Consistent Method for Imposing Sparsity in Feature-Based SLAM Information Filters
An open problem in Simultaneous Localization and Mapping (SLAM) is the development of algorithms which scale with the size of the environment. A few promising methods exploit the ...
Matthew Walter, Ryan Eustice, John J. Leonard
ISSTA
2004
ACM
15 years 7 months ago
Verifying process models built using parameterized state machines
Software process and workflow languages are increasingly used to define loosely-coupled systems of systems. These languages focus on coordination issues such as data flow and c...
Barbara Staudt Lerner
SAC
2004
ACM
15 years 7 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
SASN
2004
ACM
15 years 7 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
« Prev « First page 1908 / 2127 Last » Next »