Sciweavers

492 search results - page 84 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
WSC
2004
13 years 9 months ago
A Case Study in Meta-Simulation Design and Performance Analysis for Large-Scale Networks
Simulation and Emulation techniques are fundamental to aid the process of large-scale protocol design and network operations. However, the results from these techniques are often ...
David W. Bauer, Garrett R. Yaun, Christopher D. Ca...
EDBT
2008
ACM
159views Database» more  EDBT 2008»
14 years 8 months ago
Automaton in or out: run-time plan optimization for XML stream processing
Many systems such as Tukwila and YFilter combine automaton and algebra techniques to process queries over tokenized XML streams. Typically in this architecture, an automaton is fi...
Hong Su, Elke A. Rundensteiner, Murali Mani
ARITH
2009
IEEE
14 years 2 months ago
Unified Approach to the Design of Modulo-(2n +/- 1) Adders Based on Signed-LSB Representation of Residues
Moduli of the form 2n ± 1, which greatly simplify certain arithmetic operations in residue number systems (RNS), have been of longstanding interest. A steady stream of designs fo...
Ghassem Jaberipur, Behrooz Parhami
CVPR
2009
IEEE
14 years 2 months ago
Human age estimation using bio-inspired features
We investigate the biologically inspired features (BIF) for human age estimation from faces. As in previous bioinspired models, a pyramid of Gabor filters are used at all positio...
Guodong Guo, Guowang Mu, Yun Fu, Thomas S. Huang
CCS
2009
ACM
14 years 2 months ago
Reactive noninterference
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sj&oum...