Sciweavers

883 search results - page 58 / 177
» Applying Sensitivity Analysis in Real-Time Distributed Syste...
Sort
View
ECCV
2010
Springer
14 years 4 months ago
Fast Approximate Nearest Neighbor Methods for Non-Euclidean Manifolds with Applications to Human Activity Analysis in Videos
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...
Rizwan Chaudhry, Yuri Ivanov
PRDC
2002
IEEE
14 years 3 months ago
Reliability Analysis of Grid Computing Systems
Grid computing system is different from conventional distributed computing systems by its focus on large-scale resource sharing, where processors and communication have significan...
Y. S. Dai, Min Xie, Kim-Leng Poh
CCE
2010
13 years 8 months ago
Optimizing the design of complex energy conversion systems by Branch and Cut
The paper examines the applicability of mathematical programming methods to the simultaneous optimization of the structure and the operational parameters of a combined-cycle-based...
Turang Ahadi-Oskui, Stefan Vigerske, Ivo Nowak, Ge...
RTSS
2007
IEEE
14 years 5 months ago
Implementing Hybrid Operating Systems with Two-Level Hardware Interrupts
In this paper, we propose to implement hybrid operating systems based on two-level hardware interrupts. To separate real-time and non-real-time hardware interrupts by hardware, we...
Miao Liu, Zili Shao, Meng Wang, Hongxing Wei, Tian...
EUC
2007
Springer
14 years 5 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...