Sciweavers

18697 search results - page 3671 / 3740
» Systemic Security Management
Sort
View
ISCA
2006
IEEE
137views Hardware» more  ISCA 2006»
15 years 10 months ago
Multiple Instruction Stream Processor
Microprocessor design is undergoing a major paradigm shift towards multi-core designs, in anticipation that future performance gains will come from exploiting threadlevel parallel...
Richard A. Hankins, Gautham N. Chinya, Jamison D. ...
ISMAR
2006
IEEE
15 years 10 months ago
Online camera pose estimation in partially known and dynamic scenes
One of the key requirements of augmented reality systems is a robust real-time camera pose estimation. In this paper we present a robust approach, which does neither depend on ofļ...
Gabriele Bleser, Harald Wuest, Didier Stricker
SRDS
2006
IEEE
15 years 10 months ago
MOve: Design of An Application-Malleable Overlay
Peer-to-peer overlays allow distributed applications to work in a wide-area, scalable, and fault-tolerant manner. However, most structured and unstructured overlays present in lit...
Sébastien Monnet, Ramsés Morales, Ga...
ADBIS
2006
Springer
182views Database» more  ADBIS 2006»
15 years 10 months ago
A Middleware-Based Approach to Database Caching
Database caching supports declarative query processing close to the application. Using a full-fledged DBMS as cache manager, it enables the evaluation of specific project-select-...
Andreas Bühmann, Theo Härder, Christian ...
EXPDB
2006
ACM
15 years 10 months ago
Pushing XPath Accelerator to its Limits
Two competing encoding concepts are known to scale well with growing amounts of XML data: XPath Accelerator encoding implemented by MonetDB for in-memory documents and X-Hive’s ...
Christian Grün, Alexander Holupirek, Marc Kra...
« Prev « First page 3671 / 3740 Last » Next »