Sciweavers

1558 search results - page 216 / 312
» Scalable work stealing
Sort
View
SIGCOMM
1996
ACM
14 years 2 months ago
A Channel Access Scheme for Large Dense Packet Radio Networks
Prior work in the eld of packet radio networks has often assumed a simple success-if-exclusive model of successful reception. This simple model is insucient to model interference...
Timothy J. Shepard
ICPR
2010
IEEE
14 years 2 months ago
Efficient Semantic Indexing for Image Retrieval
Semantic analysis of a document collection can be viewed as an unsupervised clustering of the constituent words and documents around hidden or latent concepts. This has shown to i...
Chandrika Pulla, Suman Karthik, C. V. Jawahar
APPT
2009
Springer
14 years 1 months ago
Dealing with Traffic-Area Trade-Off in Direct Coherence Protocols for Many-Core CMPs
Abstract. In many-core CMP architectures, the cache coherence protocol is a key component since it can add requirements of area and power consumption to the final design and, there...
Alberto Ros, Manuel E. Acacio, José M. Garc...
ANCS
2007
ACM
14 years 1 months ago
Experimental evaluation of a coarse-grained switch scheduler
Modern high performance routers rely on sophisticated interconnection networks to meet ever increasing demands on capacity. Previous studies have used a combination of analysis an...
Charlie Wiseman, Jonathan S. Turner, Ken Wong, Bra...
COLCOM
2007
IEEE
14 years 1 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...