Sciweavers

639 search results - page 105 / 128
» Dominance Constraints with Set Operators
Sort
View
NOSSDAV
2004
Springer
14 years 23 days ago
Managing a portfolio of overlay paths
In recent years, several architectures have been proposed and developed for supporting streaming applications that take advantage of multiple paths through the network simultaneou...
Daria Antonova, Arvind Krishnamurthy, Zheng Ma, Ra...
SCVMA
2004
Springer
14 years 23 days ago
Analysis and Interpretation of Multiple Motions Through Surface Saliency
1 . The problem of recovering the 3-D camera and scene structure has been intensively studied and is considered well understood. Starting with two images, a process of establishing...
Mircea Nicolescu, Changki Min, Gérard G. Me...
HPDC
2002
IEEE
14 years 11 days ago
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. So...
Kavitha Ranganathan, Ian T. Foster
ICDCSW
2002
IEEE
14 years 11 days ago
The Impact of Data Aggregation in Wireless Sensor Networks
Sensor networks are distributed event-based systems that differ from traditional communication networks in several ways: sensor networks have severe energy constraints, redundant ...
Bhaskar Krishnamachari, Deborah Estrin, Stephen B....
PLDI
2000
ACM
13 years 11 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps