Sciweavers

898 search results - page 89 / 180
» A Linear Tabling Mechanism
Sort
View
MOBIHOC
2009
ACM
14 years 2 months ago
Routing in multi-hop wireless mesh networks with bandwidth guarantees
Wireless Mesh Networks (WMNs) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we d...
Ronghui Hou, King-Shan Lui, Hon Sun Chiu, Kwan L. ...
SI3D
2009
ACM
14 years 2 months ago
Granular visibility queries on the GPU
Efficient visibility queries are key in many interactive rendering techniques, such as occlusion culling, level of detail determination, and perceptual rendering. The occlusion q...
Thomas Engelhardt, Carsten Dachsbacher
ANSS
2008
IEEE
14 years 2 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
ISCA
2008
IEEE
92views Hardware» more  ISCA 2008»
14 years 2 months ago
Counting Dependence Predictors
Modern processors rely on memory dependence prediction to execute load instructions as early as possible, speculating that they are not dependent on an earlier, unissued store. To...
Franziska Roesner, Doug Burger, Stephen W. Keckler
ADC
2008
Springer
156views Database» more  ADC 2008»
14 years 2 months ago
Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream
Mining frequent patterns in a data stream is very challenging for the high complexity of managing patterns with bounded memory against the unbounded data. While many approaches as...
Ming-Yen Lin, Sue-Chen Hsueh, Sheng-Kun Hwang