Sciweavers

15888 search results - page 2920 / 3178
» Supporting human-intensive systems
Sort
View
120
Voted
VRML
2006
ACM
15 years 9 months ago
A case for 3D streaming on peer-to-peer networks
One of the most serious issues holding back the widespread of 3D contents on Internet has been their inaccessibility due to large data volume. Many compression and progressive tra...
Shun-Yun Hu
CODES
2005
IEEE
15 years 9 months ago
Memory access optimizations in instruction-set simulators
Design of programmable processors and embedded applications requires instruction-set simulators for early exploration and validation of candidate architectures. Interpretive simul...
Mehrdad Reshadi, Prabhat Mishra
ICPP
2005
IEEE
15 years 9 months ago
Service Migration in Distributed Virtual Machines for Adaptive Grid Computing
Computational grids can integrate geographically distributed resources into a seamless environment. To facilitate managing these heterogenous resources, the virtual machine gy pro...
Song Fu, Cheng-Zhong Xu
143
Voted
IEEEPACT
2005
IEEE
15 years 9 months ago
HUNTing the Overlap
Hiding communication latency is an important optimization for parallel programs. Programmers or compilers achieve this by using non-blocking communication primitives and overlappi...
Costin Iancu, Parry Husbands, Paul Hargrove
IWIA
2005
IEEE
15 years 9 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
« Prev « First page 2920 / 3178 Last » Next »