Sciweavers

2973 search results - page 518 / 595
» Non-photorealistic virtual environments
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
FLoD: A Framework for Peer-to-Peer 3D Streaming
—Interactive 3D content on Internet has yet become popular due to its typically large volume and the limited network bandwidth. Progressive content transmission, or 3D streaming,...
Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 2 months ago
Outlier Detection for Fine-grained Load Balancing in Database Clusters
Recent industry trends towards reducing the costs of ownership in large data centers emphasize the need for database system techniques for both automatic performance tuning and ef...
Jin Chen, Gokul Soundararajan, Madalin Mihailescu,...
CASES
2006
ACM
14 years 1 months ago
Supporting precise garbage collection in Java Bytecode-to-C ahead-of-time compiler for embedded systems
A Java bytecode-to-C ahead-of-time compiler (AOTC) can improve the performance of a Java virtual machine (JVM) by translating bytecode into C code, which is then compiled into mac...
Dong-Heon Jung, Sung-Hwan Bae, Jaemok Lee, Soo-Moo...
SIGCSE
2006
ACM
362views Education» more  SIGCSE 2006»
14 years 1 months ago
Chirp on crickets: teaching compilers using an embedded robot controller
Traditionally, the topics of compiler construction and language processing have been taught as an elective course in Computer Science curricula. As such, students may graduate wit...
Li Xu, Fred G. Martin
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 1 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...