Sciweavers

17054 search results - page 3402 / 3411
» Logics of Dynamical Systems
Sort
View
PPOPP
2010
ACM
13 years 5 months ago
Analyzing lock contention in multithreaded applications
Many programs exploit shared-memory parallelism using multithreading. Threaded codes typically use locks to coordinate access to shared data. In many cases, contention for locks r...
Nathan R. Tallent, John M. Mellor-Crummey, Allan P...
SIGMOBILE
2010
107views more  SIGMOBILE 2010»
13 years 5 months ago
Oceansense: monitoring the sea with wireless sensor networks
—Wireless sensor networks enable large amount of surveillance applications especially for critical and even hostile environments, for example, the sea monitoring. In OceanSense, ...
Kebin Liu, Zheng Yang, Mo Li, Zhongwen Guo, Ying G...
TKDE
2010
152views more  TKDE 2010»
13 years 5 months ago
Maintaining Recursive Views of Regions and Connectivity in Networks
— The data management community has recently begun to consider declarative network routing and distributed acquisition: e.g., sensor networks that execute queries about contiguou...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
TMC
2010
210views more  TMC 2010»
13 years 5 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...
TVCG
2010
165views more  TVCG 2010»
13 years 5 months ago
A Visual Backchannel for Large-Scale Events
—We introduce the concept of a Visual Backchannel as a novel way of following and exploring online conversations about large-scale events. Microblogging communities, such as Twit...
Marian Dörk, Daniel M. Gruen, Carey Williamso...
« Prev « First page 3402 / 3411 Last » Next »