Sciweavers

3771 search results - page 522 / 755
» Subobject Transformation Systems
Sort
View
124
Voted
ISPDC
2006
IEEE
15 years 10 months ago
How to Achieve High Throughput with Dynamic Tree-Structured Coterie
Data replication permits a better network bandwidth utilization and minimizes the effect of latency in large-scale systems such as computing grids. However, the cost of maintainin...
Ivan Frain, Abdelaziz Mzoughi, Jean Paul Bahsoun
AIPR
2005
IEEE
15 years 9 months ago
Hyperspectral Detection Algorithms: Operational, Next Generation, on the Horizon
Abstract—The multi-band target detection algorithms implemented in hyperspectral imaging systems represent perhaps the most successful example of image fusion. A core suite of su...
A. Schaum
CGO
2005
IEEE
15 years 9 months ago
Reactive Techniques for Controlling Software Speculation
Aggressive software speculation holds significant potential, because it enables program transformations to reduce the program’s critical path. Like any form of speculation, how...
Craig B. Zilles, Naveen Neelakantam
COMPSAC
2005
IEEE
15 years 9 months ago
An Empirical Performance Study for Validating a Performance Analysis Approach: PSIM
Performance analysis gains more attention in recent years by researchers who focus their study on the early software development stages to mitigate the risk of redesign as problem...
Jinchun Xia, Yujia Ge, Carl K. Chang
111
Voted
HICSS
2005
IEEE
96views Biometrics» more  HICSS 2005»
15 years 9 months ago
Network Centric Warfare in the U.S. Navy's Fifth Fleet
This case study was commissioned by the Office of Force Transformation in the United States Department of Defense to examine the employment of Network Centric Warfare (NCW) system...
John Kruse, Mark Adkins, Kimberly A. Holloman