Sciweavers

658 search results - page 68 / 132
» Time Management in the DoD High Level Architecture
Sort
View
TMC
2008
159views more  TMC 2008»
14 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
GCC
2009
Springer
14 years 7 months ago
Accounting and Billing for Federated Cloud Infrastructures
Emerging Cloud computing infrastructures provide computing resources on demand based on postpaid principles. For example, the RESERVOIR project develops an infrastructure capable o...
Erik Elmroth, Fermín Galán Má...
ICPP
2008
IEEE
15 years 4 months ago
Optimizing Issue Queue Reliability to Soft Errors on Simultaneous Multithreaded Architectures
The issue queue (IQ) is a key microarchitecture structure for exploiting instruction-level and thread-level parallelism in dynamically scheduled simultaneous multithreaded (SMT) p...
Xin Fu, Wangyuan Zhang, Tao Li, José A. B. ...
ATAL
1995
Springer
15 years 1 months ago
Alarms: An Implementation of Motivated Agency
Autonomousagentsin the real world must be capableof asynchronous goal generation. However, one consequence of this ability is that the agent may generate a substantial number of go...
Timothy J. Norman, Derek Long
RTAS
2009
IEEE
15 years 4 months ago
Adaptive Failover for Real-Time Middleware with Passive Replication
Supporting uninterrupted services for distributed soft real-time applications is hard in resource-constrained and dynamic environments, where processor or process failures and sys...
Jaiganesh Balasubramanian, Sumant Tambe, Chenyang ...