Sciweavers

438 search results - page 48 / 88
» Automated Service Level Reporting: Experience of Implementat...
Sort
View
ADHOC
2004
100views more  ADHOC 2004»
13 years 9 months ago
Position and orientation in ad hoc networks
Position and orientation information of individual nodes in ad hoc networks is useful for both service and application implementation. Services that can be enabled by availability...
Dragos Niculescu, Badri Nath
ICRA
2009
IEEE
122views Robotics» more  ICRA 2009»
14 years 3 months ago
Probabilistic search optimization and mission assignment for heterogeneous autonomous agents
— This paper presents an algorithmic framework for conducting search and identification missions using multiple heterogeneous agents. Dynamic objects of type “neutral” or ...
Timothy H. Chung, Moshe Kress, Johannes O. Royset
ISORC
2009
IEEE
14 years 3 months ago
Thread-Local Scope Caching for Real-time Java
There is increasing convergence between the fields of parallel and embedded computing. The demand for more functionality in embedded devices means that complex multicore architec...
Andy J. Wellings, Martin Schoeberl
IWMM
2009
Springer
125views Hardware» more  IWMM 2009»
14 years 3 months ago
Precise garbage collection for C
Magpie is a source-to-source transformation for C programs that enables precise garbage collection, where precise means that integers are not confused with pointers, and the liven...
Jon Rafkind, Adam Wick, John Regehr, Matthew Flatt
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
14 years 3 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich