Sciweavers

1351 search results - page 256 / 271
» A Possible Approach to the Development of Robotic Multi-Agen...
Sort
View
SIGMETRICS
2004
ACM
124views Hardware» more  SIGMETRICS 2004»
14 years 4 days ago
Interposed proportional sharing for a storage service utility
This paper develops and evaluates new share-based scheduling algorithms for differentiated service quality in network services, such as network storage servers. This form of resou...
Wei Jin, Jeffrey S. Chase, Jasleen Kaur
SACMAT
2003
ACM
13 years 12 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
FCCM
2004
IEEE
118views VLSI» more  FCCM 2004»
13 years 10 months ago
Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor
Reconfigurable System-on-Chip (SoC) platforms that incorporate hard-core processors surrounded by large amounts of FPGA are today commodities: the reconfigurable logic is often us...
Miljan Vuletic, Laura Pozzi, Paolo Ienne
DKE
2007
130views more  DKE 2007»
13 years 6 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
VR
2002
IEEE
170views Virtual Reality» more  VR 2002»
13 years 6 months ago
Handling of Virtual Contact in Immersive Virtual Environments: Beyond Visuals
This paper addresses the issue of improving the perception of contact that users make with purely virtual objects in virtual environments. Because these objects have no physical c...
Robert W. Lindeman, James N. Templeman, John L. Si...