Sciweavers

1368 search results - page 84 / 274
» The Implicit Pipeline Method
Sort
View
ACSC
2005
IEEE
14 years 3 months ago
Large Object Segmentation with Region Priority Rendering
The Address Recalculation Pipeline is a hardware architecture designed to reduce the end-to-end latency suffered by immersive Head Mounted Display virtual reality systems. A deman...
Yang-Wai Chow, Ronald Pose, Matthew Regan
HPCA
2005
IEEE
14 years 3 months ago
Heat Stroke: Power-Density-Based Denial of Service in SMT
In the past, there have been several denial-of-service (DOS) attacks which exhaust some shared resource (e.g., physical memory, process table, file descriptors, TCP connections) ...
Jahangir Hasan, Ankit Jalote, T. N. Vijaykumar, Ca...
CLUSTER
2004
IEEE
14 years 1 months ago
A client-centric grid knowledgebase
Grid computing brings with it additional complexities and unexpected failures. Just keeping track of our jobs traversing different grid resources before completion can at times be...
George Kola, Tevfik Kosar, Miron Livny
VLDB
1993
ACM
121views Database» more  VLDB 1993»
14 years 2 months ago
Integrity Constraint and Rule Maintenance in Temporal Deductive Knowledge Bases
The enforcement of semantic integrity constraints in data and knowledge bases constitutea a major performance bottleneck. Integrity constraint simplification methods aim at reduci...
Dimitris Plexousakis
CDC
2008
IEEE
403views Control Systems» more  CDC 2008»
14 years 4 months ago
A collocation model for water-hammer dynamics with application to leak detection
— This paper presents a new model for so-called water hammer equations based on a collocation method. This model is shown to fairly represent possible leak effects in a pipeline ...
Flor Lizeth Torres Ortiz, Gildas Besancon, Didier ...