Sciweavers

334 search results - page 59 / 67
» Concurrency Among Strangers
Sort
View
DATE
2008
IEEE
223views Hardware» more  DATE 2008»
14 years 4 months ago
Cooperative Safety: a Combination of Multiple Technologies
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...
IPPS
2008
IEEE
14 years 4 months ago
Multi-source video multicast in peer-to-peer networks
We propose a novel framework for multi-source video streaming in peer-to-peer (P2P) networks. Multiple videos are distributed to all requesting peers exploiting full collaboration...
Francisco de Asís López-Fuentes, Eck...
ISCA
2008
IEEE
139views Hardware» more  ISCA 2008»
14 years 4 months ago
Atom-Aid: Detecting and Surviving Atomicity Violations
Writing shared-memory parallel programs is error-prone. Among the concurrency errors that programmers often face are atomicity violations, which are especially challenging. They h...
Brandon Lucia, Joseph Devietti, Karin Strauss, Lui...
ICDCS
2007
IEEE
14 years 4 months ago
Magellan: Charting Large-Scale Peer-to-Peer Live Streaming Topologies
Live peer-to-peer (P2P) streaming applications have been successfully deployed in the Internet. With relatively simple peer selection protocol design, modern live P2P streaming ap...
Chuan Wu, Baochun Li, Shuqiao Zhao
MICRO
2007
IEEE
137views Hardware» more  MICRO 2007»
14 years 4 months ago
Implementing Signatures for Transactional Memory
Transactional Memory (TM) systems must track the read and write sets—items read and written during a transaction—to detect conflicts among concurrent transactions. Several TM...
Daniel Sanchez, Luke Yen, Mark D. Hill, Karthikeya...