Sciweavers

470 search results - page 55 / 94
» Matrix Robustness, with an Application to Power System Obser...
Sort
View
JVM
2001
99views Education» more  JVM 2001»
13 years 9 months ago
JVM Susceptibility to Memory Errors
Modern computer systems are becoming more powerful and are using larger memories. However, except for very high end systems, little attention is being paid to high availability. T...
DeQing Chen, Alan Messer, Philippe Bernadat, Guang...
INFOCOM
2007
IEEE
14 years 2 months ago
Can Retransmissions of Superexponential Documents Cause Subexponential Delays?
— Consider a generic data unit of random size L that needs to be transmitted over a channel of unit capacity. The channel dynamics is modeled as an on-off process {(Ai, Ui)}i≥1...
Predrag R. Jelenkovic, Jian Tan
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 1 months ago
Missing the Forest for the Trees - Object Technology's Second Hiatus
Object technology was first created in 1967, but it had to wait till the mid 80’s for widespread acceptance and adoption. We observe that that was not the only hiatus for the te...
Viswanathan Kodaganallur
HICSS
1999
IEEE
193views Biometrics» more  HICSS 1999»
14 years 10 hour ago
Web-based Access to Distributed High-Performance Geographic Information Systems for Decision Support
A number of applications that use GIS for decision support can potentially be enhanced by the use of high-performance computers, broadband networks and mass data stores. We descri...
Paul D. Coddington, Kenneth A. Hawick, Heath A. Ja...
VLDB
2005
ACM
159views Database» more  VLDB 2005»
14 years 1 months ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu