Sciweavers

1045 search results - page 109 / 209
» The Use of Exceptions
Sort
View
CN
1998
81views more  CN 1998»
13 years 8 months ago
Improving the WWW: Caching or Multicast?
We consider two schemes for the distributionof Web documents. In the first scheme the sender repeatedly transmits the Web document into a multicast address, and receivers asynchr...
Pablo Rodriguez, Keith W. Ross, Ernst Biersack
INFOCOM
2010
IEEE
13 years 6 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
ISCA
1998
IEEE
151views Hardware» more  ISCA 1998»
14 years 14 days ago
Integrated Predicated and Speculative Execution in the IMPACT EPIC Architecture
Explicitly Parallel Instruction Computing (EPIC) architectures require the compiler to express program instruction level parallelism directly to the hardware. EPIC techniques whic...
David I. August, Daniel A. Connors, Scott A. Mahlk...
CVPR
2007
IEEE
14 years 10 months ago
Real-Time License Plate Recognition on an Embedded DSP-Platform
In this paper we present a full-featured license plate detection and recognition system. The system is implemented on an embedded DSP platform and processes a video stream in real...
Clemens Arth, Florian Limberger, Horst Bischof
ICDE
2001
IEEE
113views Database» more  ICDE 2001»
14 years 9 months ago
Measuring and Optimizing a System for Persistent Database Sessions
High availability for both data and applications is rapidly becoming a business requirement. While database systems support recovery, providing high database availability, applica...
Roger S. Barga, David B. Lomet