Sciweavers

1203 search results - page 92 / 241
» Toward high performance computing in unconventional computin...
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
14 years 11 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
SEM
2004
Springer
15 years 3 months ago
Towards the Development of Ubiquitous Middleware Product Lines
Abstract. Ubiquitous computing is a challenge for the design of middleware. The reasons are resource constraints, mobility, heterogeneity, etc., just to name a few. We argue that s...
Sven Apel, Klemens Böhm
EWSN
2009
Springer
15 years 10 months ago
SRCP: Simple Remote Control for Perpetual High-Power Sensor Networks
Remote management is essential for wireless sensor networks (WSNs) designed to run perpetually using harvested energy. A natural division of function for managing WSNs is to employ...
Navin Sharma, Jeremy Gummeson, David Irwin, Prasha...
77
Voted
RT
2000
Springer
15 years 1 months ago
Walkthroughs with Corrective Texturing
Abstract. We present a new hybrid rendering method for interactive walkthroughs in photometrically complex environments. The display process starts from some approximation of the s...
Marc Stamminger, Jörg Haber, Hartmut Schirmac...
CORR
2010
Springer
128views Education» more  CORR 2010»
14 years 10 months ago
A Performance Study of GA and LSH in Multiprocessor Job Scheduling
Multiprocessor task scheduling is an important and computationally difficult problem. This paper proposes a comparison study of genetic algorithm and list scheduling algorithm. Bo...
S. R. Vijayalakshmi, G. Padmavathi