Sciweavers

2038 search results - page 134 / 408
» Loops under Strategies
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Is Deterministic Deployment Worse than Random Deployment for Wireless Sensor Networks?
— Before a sensor network is deployed, it is important to determine how many sensors are required to achieve a certain coverage degree. The number of sensor required for maintain...
Honghai Zhang, Jennifer C. Hou
ICDE
1991
IEEE
133views Database» more  ICDE 1991»
15 years 7 months ago
Read Optimized File System Designs: A Performance Evaluation
This paper presents a performance comparison of several file system allocation policies. The file systems are designed to provide high bandwidth between disks and main memory by...
Margo I. Seltzer, Michael Stonebraker
APAL
2008
90views more  APAL 2008»
15 years 4 months ago
On the unity of duality
Most type systems are agnostic regarding the evaluation strategy for the underlying languages, with the value restriction for ML which is absent in Haskell as a notable exception....
Noam Zeilberger
CVPR
2008
IEEE
16 years 6 months ago
A mobile vision system for robust multi-person tracking
We present a mobile vision system for multi-person tracking in busy environments. Specifically, the system integrates continuous visual odometry computation with tracking-bydetect...
Andreas Ess, Bastian Leibe, Konrad Schindler, Luc ...
PPOPP
2010
ACM
16 years 1 months ago
Lazy binary-splitting: a run-time adaptive work-stealing scheduler
We present Lazy Binary Splitting (LBS), a user-level scheduler of nested parallelism for shared-memory multiprocessors that builds on existing Eager Binary Splitting work-stealing...
Alexandros Tzannes, George C. Caragea, Rajeev Baru...