Sciweavers

789 search results - page 4 / 158
» Pushing using Compliance
Sort
View
ESEC
1999
Springer
13 years 11 months ago
A Component and Communication Model for Push Systems
We present a communication and component model for push systems. Surprisingly, despite the widespread use of many push services on the Internet, no such models exist. Our communica...
Manfred Hauswirth, Mehdi Jazayeri
WSC
2008
13 years 9 months ago
Clarifying CONWIP versus push system behavior using simulation
This research examines the performance of CONWIP versus "push" workload control in a simple, balanced manufacturing flowline. Analytical models and simulation experiment...
S. T. Enns, Paul Rogers
ENTCS
2006
80views more  ENTCS 2006»
13 years 7 months ago
Synchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider thi...
Thomas B. Quillinan, Simon N. Foley
DAIS
2006
13 years 8 months ago
Using Speculative Push for Unnecessary Checkpoint Creation Avoidance
Abstract. This paper discusses a way of incorporating speculation techniques into Distributed Shared Memory (DSM) systems with checkpointing mechanism without creating unnecessary ...
Arkadiusz Danilecki, Michal Szychowiak
IROS
2006
IEEE
147views Robotics» more  IROS 2006»
14 years 1 months ago
Opportunistic Use of Vision to Push Back the Path-Planning Horizon
Abstract— Mobile robots need maps or other forms of geometric information about the environment to navigate. The mobility sensors (LADAR, stereo, etc.) on these robotic vehicles ...
Bart C. Nabbe, Derek Hoiem, Alexei A. Efros, Marti...