Sciweavers

283 search results - page 36 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
ASPLOS
2008
ACM
13 years 9 months ago
General and efficient locking without blocking
Standard concurrency control mechanisms offer a trade-off: Transactional memory approaches maximize concurrency, but suffer high overheads and cost for retrying in the case of act...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
CC
2005
Springer
153views System Software» more  CC 2005»
14 years 1 months ago
Completeness Analysis for Incomplete Object-Oriented Programs
We introduce a new approach, called completeness analysis, to computing points-to sets for incomplete Java programs such as library modules or applications in the presence of dynam...
Jingling Xue, Phung Hua Nguyen
ISPDC
2010
IEEE
13 years 6 months ago
Practical Uniform Peer Sampling under Churn
—Providing independent uniform samples from a system population poses considerable problems in highly dynamic settings, like P2P systems, where the number of participants and the...
Roberto Baldoni, Marco Platania, Leonardo Querzoni...
ICC
2008
IEEE
113views Communications» more  ICC 2008»
14 years 2 months ago
Multiuser MIMO Downlink Beamforming Based on Group Maximum SINR Filtering
Abstract—In this paper we aim to solve the multiuser multiinput multi-output (MIMO) downlink beamforming problem. The transmitter is a multi-antenna base-station broadcasting to ...
Yu-Han Yang, Shih-Chun Lin, Hsuan-Jung Su
ISMVL
2008
IEEE
148views Hardware» more  ISMVL 2008»
14 years 2 months ago
Quantum Logic Implementation of Unary Arithmetic Operations
The mathematical property of inheritance for certain unary fixed point operations has recently been exploited to enable the efficient formulation of arithmetic algorithms and circ...
Mitchell A. Thornton, David W. Matula, Laura Spenn...