Sciweavers

558 search results - page 4 / 112
» Safe and Effective Determinant Evaluation
Sort
View
POPL
2011
ACM
14 years 10 days ago
Safe nondeterminism in a deterministic-by-default parallel language
A number of deterministic parallel programming models with strong safety guarantees are emerging, but similar support for nondeterministic algorithms, such as branch and bound sea...
Robert L. Bocchino Jr., Stephen Heumann, Nima Hona...
CASES
2004
ACM
15 years 2 months ago
Safely exploiting multithreaded processors to tolerate memory latency in real-time systems
A coarse-grain multithreaded processor can effectively hide long memory latencies by quickly switching to an alternate task when the active task issues a memory request, improving...
Ali El-Haj-Mahmoud, Eric Rotenberg
53
Voted
CG
2004
Springer
15 years 1 months ago
An Improved Safety Solver for Computer Go
Most Go-playing programs use a combination of search and heuristics based on an influence function to determine whether territories are safe. However, to assure the correct evaluat...
Xiaozhen Niu, Martin Müller 0003
IVA
2010
Springer
14 years 7 months ago
Evaluating the Effect of Gesture and Language on Personality Perception in Conversational Agents
A significant goal in multi-modal virtual agent research is to determine how to vary expressive qualities of a character so that it is perceived in a desired way. The "Big Fiv...
Michael Neff, Yingying Wang, Rob Abbott, Marilyn A...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 4 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...