Sciweavers

5241 search results - page 1017 / 1049
» Embedded Programming with C
Sort
View
CLUSTER
2002
IEEE
14 years 28 days ago
User-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Jeff Siegel, Paul Lu
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
14 years 27 days ago
A New Buffer Management Scheme for Multimedia Terminals in Broadband Satellite Networks
In the recent years, there has been a growing interest in broadband satellite networks. Broadband satellite networks are designed to provide the required qualify of service (QoS) ...
Mahnoosh Mobasseri, Victor C. M. Leung
ICARCV
2002
IEEE
149views Robotics» more  ICARCV 2002»
14 years 27 days ago
A fast method to simulate virtual deformable objects with force feedback
In this paper, we propose solutions to real time simulation and interaction of deformable objects in virtual reality. Firstly, we present LEM - Long Element Method, a method creat...
Kenneth Sundaraj, César Mendoza, Christian ...
ICPPW
2002
IEEE
14 years 27 days ago
SNOW: Software Systems for Process Migration in High-Performance, Heterogeneous Distributed Environments
This paper reports our experiences on the Scalable Network Of Workstation (SNOW) project, which implements a novel methodology to support user-level process migration for traditio...
Kasidit Chanchio, Xian-He Sun
SACMAT
2010
ACM
14 years 23 days ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
« Prev « First page 1017 / 1049 Last » Next »