Sciweavers

1015 search results - page 145 / 203
» The data locality of work stealing
Sort
View
ICCV
2005
IEEE
14 years 2 months ago
TemporalBoost for Event Recognition
This paper contributes a new boosting paradigm to achieve detection of events in video. Previous boosting paradigms in vision focus on single frame detection and do not scale to v...
Paul Smith, Niels da Vitoria Lobo, Mubarak Shah
VRML
2005
ACM
14 years 2 months ago
Visualization across the pond: how a wireless PDA can collaborate with million-polygon datasets via 9, 000km of cable
We present an initial report on using our distributed, collaborative grid enabled visualization environment to link SuperComputing 2004 (Pittsburgh, PA, USA) with the Cardiff Scho...
Ian J. Grimstead, Nick J. Avis, David W. Walker
GCC
2004
Springer
14 years 2 months ago
End Host Multicast for Peer-to-Peer Systems
Abstract. Multicast is an effective means for conducting the cooperative P2P communications. This paper studies an algorithm to construct a scalable and efficient end host multica...
Wanqing Tu, Weijia Jia
PACS
2004
Springer
172views Hardware» more  PACS 2004»
14 years 2 months ago
Safe Overprovisioning: Using Power Limits to Increase Aggregate Throughput
Management of power in data centers is driven by the need to not exceed circuit capacity. The methods employed in the oversight of these power circuits are typically static and ad...
Mark E. Femal, Vincent W. Freeh
ICPPW
2003
IEEE
14 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao