Sciweavers

22114 search results - page 4380 / 4423
» Use of Models and Modelling Techniques for Service Developme...
Sort
View
EUROPAR
2009
Springer
15 years 8 months ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris
SEMWEB
2009
Springer
15 years 8 months ago
Enrichment and Ranking of the YouTube Tag Space and Integration with the Linked Data Cloud
The increase of personal digital cameras with video functionality and video-enabled camera phones has increased the amount of user-generated videos on the Web. People are spending ...
Smitashree Choudhury, John G. Breslin, Alexandre P...
ISCA
2000
IEEE
107views Hardware» more  ISCA 2000»
15 years 8 months ago
A fully associative software-managed cache design
As DRAM access latencies approach a thousand instructionexecution times and on-chip caches grow to multiple megabytes, it is not clear that conventional cache structures continue ...
Erik G. Hallnor, Steven K. Reinhardt
ECCV
2010
Springer
15 years 8 months ago
Hough Transform and 3D SURF for robust three dimensional classification
Most methods for the recognition of shape classes from 3D datasets focus on classifying clean, often manually generated models. However, 3D shapes obtained through acquisition tech...
127
Voted
NPIV
1998
ACM
108views Visualization» more  NPIV 1998»
15 years 8 months ago
Visualization for situation awareness
We explore techniques from visualization and computational geometry to make tactical information more intuitive to a military commander. To be successful, the commander must quick...
C. M. Hoffman, Y.-J. Kim, R. P. Winkler, J. D. Wal...
« Prev « First page 4380 / 4423 Last » Next »