Sciweavers

537 search results - page 56 / 108
» A Call to Regularity
Sort
View
JISE
2007
98views more  JISE 2007»
13 years 7 months ago
Integrated Buffer and Route Management in a DTN with Message Ferry
Unlike normal wireless ad hoc networks, end-to-end connection may not exist in DTNs Thus, the Message Ferrying (MF) scheme has been proposed as a strategy for providing connectivi...
Mooi Choo Chuah, Wenbin Ma
APIN
2004
127views more  APIN 2004»
13 years 7 months ago
CLSS: An Intelligent Crane Lorry Scheduling System
Companies that provide crane-lorry services are faced with the daily need to perform vehicle and driver allocation and scheduling. Many companies still do this manually due to the ...
Hon Wai Chun, Rebecca Y. M. Wong
TJS
2002
83views more  TJS 2002»
13 years 7 months ago
An I/O-Conscious Tiling Strategy for Disk-Resident Data Sets
This paper describes a tiling technique that can be used by application programmers and optimizing compilers to obtain I/O-efficient versions of regular scientific loop nests. Due ...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
NDSS
2008
IEEE
14 years 2 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
HPCC
2009
Springer
14 years 10 days ago
On Instruction-Level Method for Reducing Cache Penalties in Embedded VLIW Processors
Usual cache optimisation techniques for high performance computing are difficult to apply in embedded VLIW applications. First, embedded applications are not always well structur...
Samir Ammenouche, Sid Ahmed Ali Touati, William Ja...