Sciweavers

492 search results - page 72 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
PLDI
2011
ACM
12 years 10 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
FAST
2009
13 years 5 months ago
Enabling Transactional File Access via Lightweight Kernel Extensions
Transactions offer a powerful data-access method used in many databases today trough a specialized query API. User applications, however, use a different fileaccess API (POSIX) wh...
Richard P. Spillane, Sachin Gaikwad, Manjunath Chi...
IAT
2006
IEEE
14 years 2 months ago
Enhanced Recommendations through Propagation of Trust and Distrust
The incorporation of a trust network among the users of a recommender system (RS) proves beneficial to the quality and amount of recommendations. Involving also distrust can offe...
Patricia Victor, Chris Cornelis, Martine De Cock
ICRA
2003
IEEE
156views Robotics» more  ICRA 2003»
14 years 1 months ago
TopBot: automated network topology detection with a mobile robot
Abstract— We have demonstrated that a properlyequipped mobile robot can easily construct a detailed map of the wireless coverage of an urban environment. The Autonomous Vehicle f...
Paul Blaer, Peter K. Allen
SIGCSE
2000
ACM
193views Education» more  SIGCSE 2000»
14 years 10 days ago
Experimentation with bounded buffer synchronization
Undergraduates are usually introduced to synchronization in operating systems through a discussion of classical problems such as reader-writer or producers-consumers. The traditio...
Steven Robbins