Sciweavers

135 search results - page 24 / 27
» Modelling Faces Dynamically across Views and Over Time
Sort
View
WSC
1998
13 years 10 months ago
Implementing the Theory of Constraints Philosophy in Highly Reentrant Systems
A significant challenge in implementing the Theory of Constraints in the semiconductor industry is the complex and reentrant nature of the manufacturing process. Managing a constr...
Clay Rippenhagen, Shekar Krishnaswamy
SIGMOD
2005
ACM
138views Database» more  SIGMOD 2005»
14 years 8 months ago
QPipe: A Simultaneously Pipelined Relational Query Engine
Relational DBMS typically execute concurrent queries independently by invoking a set of operator instances for each query. To exploit common data retrievals and computation in con...
Stavros Harizopoulos, Vladislav Shkapenyuk, Anasta...
IMC
2006
ACM
14 years 2 months ago
Quantifying path exploration in the internet
A number of previous measurement studies [10, 12, 17] have shown the existence of path exploration and slow convergence in the global Internet routing system, and a number of prot...
Ricardo V. Oliveira, Beichuan Zhang, Dan Pei, Rafi...
MMS
2010
13 years 3 months ago
InstantLeap: an architecture for fast neighbor discovery in large-scale P2P VoD streaming
In large-scale peer-to-peer (P2P) Video-on-Demand (VoD) streaming applications, a fundamental challenge is to quickly locate new supplying peers whenever a VCR command is issued, ...
Xuanjia Qiu, Wei Huang, Chuan Wu, Francis C. M. La...
INFOCOM
2010
IEEE
13 years 7 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman