Sciweavers

715 search results - page 126 / 143
» An Analysis of Performance Interference Effects in Virtual E...
Sort
View
ASPLOS
2010
ACM
14 years 3 months ago
Analyzing multicore dumps to facilitate concurrency bug reproduction
Debugging concurrent programs is difficult. This is primarily because the inherent non-determinism that arises because of scheduler interleavings makes it hard to easily reproduc...
Dasarath Weeratunge, Xiangyu Zhang, Suresh Jaganna...
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
14 years 1 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
NSDI
2008
13 years 11 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
AMDO
2008
Springer
13 years 10 months ago
A Comparative Study on Using Zernike Velocity Moments and Hidden Markov Models for Hand Gesture Recognition
Hand-gesture recognition presents a challenging problem for computer vision due to the articulated structure of the human hand and the complexity of the environments in which it is...
Moaath Al-Rajab, David Hogg, Kia Ng
IMC
2007
ACM
13 years 10 months ago
Towards network triangle inequality violation aware distributed systems
Many distributed systems rely on neighbor selection mechanisms to create overlay structures that have good network performance. These neighbor selection mechanisms often assume th...
Guohui Wang, Bo Zhang, T. S. Eugene Ng