Sciweavers

1663 search results - page 283 / 333
» Validation and Verification of Simulation Models
Sort
View
121
Voted
PODC
1994
ACM
15 years 7 months ago
A Performance Evaluation of Lock-Free Synchronization Protocols
In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Anthony LaMarca
133
Voted
WCNC
2010
IEEE
15 years 7 months ago
MAC Performance Analysis for Vehicle-to-Infrastructure Communication
—The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e....
Tom H. Luan, Xinhua Ling, Xuemin Shen
133
Voted
ATAL
2006
Springer
15 years 7 months ago
Scalable and reliable data delivery in mobile ad hoc sensor networks
This paper studies scalable data delivery algorithms in mobile ad hoc sensor networks with node and link failures. Many algorithms have been developed for data delivery and fusion...
Bin Yu, Paul Scerri, Katia P. Sycara, Yang Xu, Mic...
146
Voted
3DIM
2003
IEEE
15 years 7 months ago
Efficient Surface Reconstruction from Range Curves
This paper proposes an approach for surface reconstruction of free-form rigid objects from an arbitrary set of intersecting range curves. A strategy for updating the reconstructed...
Dragan Tubic, Patrick Hébert, Denis Laurend...
145
Voted
DSN
2008
IEEE
15 years 5 months ago
Reliability of flat XOR-based erasure codes on heterogeneous devices
XOR-based erasure codes are a computationallyefficient means of generating redundancy in storage systems. Some such erasure codes provide irregular fault tolerance: some subsets o...
Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie