Sciweavers

6274 search results - page 1088 / 1255
» Proofs, Programs, Processes
Sort
View
ISAS
2005
Springer
14 years 4 months ago
Dependable Distributed Computing Using Free Databases
Abstract. Designing and programming dependable distributed applications is very difficult. Databases provide features like transactions and replication that can help in the impleme...
Christof Fetzer, Trevor Jim
IWINAC
2005
Springer
14 years 4 months ago
Simulation of Orientation Contrast Sensitive Cell Behavior in TiViPE
Many cells in the primary visual cortex respond differently when a stimulus is placed outside their classical receptive field (CRF) compared to the stimulus within the CRF alone,...
Tino Lourens, Emilia I. Barakova
LCPC
2005
Springer
14 years 4 months ago
Revisiting Graph Coloring Register Allocation: A Study of the Chaitin-Briggs and Callahan-Koblenz Algorithms
Techniques for global register allocation via graph coloring have been extensively studied and widely implemented in compiler frameworks. This paper examines a particular variant ...
Keith D. Cooper, Anshuman Dasgupta, Jason Eckhardt
LOCA
2005
Springer
14 years 4 months ago
Context Obfuscation for Privacy via Ontological Descriptions
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is poten...
Ryan Wishart, Karen Henricksen, Jadwiga Indulska
OTM
2005
Springer
14 years 4 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
« Prev « First page 1088 / 1255 Last » Next »