Sciweavers

668 search results - page 127 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
OOPSLA
2004
Springer
14 years 22 days ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
MIR
2010
ACM
255views Multimedia» more  MIR 2010»
14 years 21 days ago
Sharing of baseball event through social media
As real-time broadcasting services are becoming more popular, many people are sharing live events with remote users. Despite the success of real-time broadcasting services, a numb...
Hogun Park, Sun-Bum Youn, Eugene Hong, Changhyeon ...
ICRA
2003
IEEE
144views Robotics» more  ICRA 2003»
14 years 20 days ago
Error-tolerant execution of complex robot tasks based on skill primitives
— This paper presents a general approach to specify and execute complex robot tasks considering uncertain environments. Robot tasks are defined by a precise definition of socal...
Ulrike Thomas, Bernd Finkemeyer, Torsten Krög...
VRML
2003
ACM
14 years 19 days ago
3D virtual clothing: from garment design to web3d visualization and simulation
One of the major challenges in Computer Graphics concerns the 3D representation and physically-based simulation of garments. In our research, we are working closely with the texti...
Luca Chittaro, Demis Corvaglia
ICS
2003
Tsinghua U.
14 years 18 days ago
miNI: reducing network interface memory requirements with dynamic handle lookup
Recent work in low-latency, high-bandwidth communication systems has resulted in building user–level Network InControllers (NICs) and communication abstractions that support dir...
Reza Azimi, Angelos Bilas