Sciweavers

13987 search results - page 2636 / 2798
» The Two Guards Problem
Sort
View
ACSC
2003
IEEE
14 years 1 months ago
Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf
As the Internet and enterprise wide distributed systems become more prevalent in business IT systems, numerous advanced COTS (commercial off-the-shelf) middleware technologies hav...
Yan Zhang, Anna Liu, Wei Qu
CLUSTER
2003
IEEE
14 years 1 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
DASFAA
2003
IEEE
108views Database» more  DASFAA 2003»
14 years 1 months ago
Spatial Query Processing for High Resolutions
Modern database applications including computeraided design (CAD), medical imaging, or molecular biology impose new requirements on spatial query processing. Particular problems a...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
DATE
2003
IEEE
102views Hardware» more  DATE 2003»
14 years 1 months ago
G-MAC: An Application-Specific MAC/Co-Processor Synthesizer
: A modern special-purpose processor (e.g., for image and graphical applications) usually contains a set of instructions supporting complex multiply-operations. These instructions ...
Alex C.-Y. Chang, Wu-An Kuo, Allen C.-H. Wu, TingT...
HICSS
2003
IEEE
96views Biometrics» more  HICSS 2003»
14 years 1 months ago
On the e-Negotiation of Unmatched Logrolling Views
An e-Negotiation process comprises computerfacilitated tasks, each of which aims at resolving an issue or a collection of co-related issues under negotiation. It involves an itera...
Shing-Chi Cheung, Patrick C. K. Hung, Dickson K. W...
« Prev « First page 2636 / 2798 Last » Next »