Sciweavers

832 search results - page 79 / 167
» Effect of Malicious Synchronization
Sort
View
IJSEKE
2002
95views more  IJSEKE 2002»
13 years 9 months ago
A Multimedia Model Based on Structured Media and Sub-Elements for Complex Multimedia Authoring and Presentation
through the specification of temporal, spatial and spatio-temporal relations. Moreover, we propose an abstract animation model that can be combined with the intra-media temporal st...
Tran-Thuong Tien, Cécile Roisin
CHI
2005
ACM
14 years 10 months ago
Chit chat club: bridging virtual and physical space for social interaction
In this work, we create an audio-video link via an interactive sculpture to facilitate casual, sociable communication between two remote spaces. This communication installation wa...
Karrie Karahalios, Kelly Dobson
HPCA
2006
IEEE
14 years 10 months ago
CORD: cost-effective (and nearly overhead-free) order-recording and data race detection
Chip-multiprocessors are becoming the dominant vehicle for general-purpose processing, and parallel software will be needed to effectively utilize them. This parallel software is ...
Milos Prvulovic
CLUSTER
2008
IEEE
14 years 4 months ago
Live and incremental whole-system migration of virtual machines using block-bitmap
—In this paper, we describe a whole-system live migration scheme, which transfers the whole system run-time state, including CPU state, memory data, and local disk storage, of th...
Yingwei Luo, Binbin Zhang, Xiaolin Wang, Zhenlin W...
DATE
2008
IEEE
69views Hardware» more  DATE 2008»
14 years 4 months ago
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme
Token passing is a channel access technique used in several communication networks. Among them, one of the most effective solution for supporting both real-time traffic (synchron...
Gianluca Franchino, Giorgio C. Buttazzo, Tullio Fa...