Sciweavers

2517 search results - page 481 / 504
» Specifying Weak Sets
Sort
View
RTCSA
1999
IEEE
13 years 11 months ago
Scheduling Fixed-Priority Tasks with Preemption Threshold
While it is widely believed that preemptability is a necessary requirement for developing real-time software, there are additional costs involved with preemptive scheduling, as co...
Yun Wang, Manas Saksena
MOBICOM
1998
ACM
13 years 11 months ago
On Programmable Universal Mobile Channels in a Cellular Internet
In this paper we introduce universal mobile channels, a le communications abstraction that enables users and service providers to program application-speci c adaptive mobile servi...
Raymond R.-F. Liao, Andrew T. Campbell
SIGMOD
1998
ACM
99views Database» more  SIGMOD 1998»
13 years 11 months ago
CURE: An Efficient Clustering Algorithm for Large Databases
Clustering, in data mining, is useful for discovering groups and identifying interesting distributions in the underlying data. Traditional clustering algorithms either favor clust...
Sudipto Guha, Rajeev Rastogi, Kyuseok Shim
LCR
1998
Springer
119views System Software» more  LCR 1998»
13 years 11 months ago
QoS Aspect Languages and Their Runtime Integration
Abstract. Distributedobject middleware, suchas CORBA, hides systemand network-speci c characteristics of objects behind functional interface speci cations. This simpli es developme...
Joseph P. Loyall, David E. Bakken, Richard E. Scha...
SMILE
1998
Springer
13 years 11 months ago
Interactive 3D Modeling from Multiple Images Using Scene Regularities
Abstract. We present some recent progress in designing and implementing two interactive image-based 3D modeling systems. The first system constructs 3D models from a collection of ...
Heung-Yeung Shum, Richard Szeliski, Simon Baker, M...