Sciweavers

5544 search results - page 1048 / 1109
» Three Inadequate Models
Sort
View
ICCS
2004
Springer
14 years 1 months ago
A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
This paper presents a two-leveled mobile agent system for electronic commerce. It is based on mobile agents as mediators and uses the publish/subscribe paradigm for registration an...
Ozgur Koray Sahingoz, Nadia Erdogan
IMR
2004
Springer
14 years 1 months ago
Finite Element Mesh Sizing for Surfaces Using Skeleton
The finite element (FE) mesh sizing has great influence on computational time, memory usage, and accuracy of FE analysis. Based on a systematic in-depth study of the geometric com...
William Roshan Quadros, Steven J. Owen, Michael L....
IWQOS
2004
Springer
14 years 1 months ago
Service availability: a new approach to characterize IP backbone topologies
— Traditional SLAs, defined by average delay or packet loss, often camouflage the instantaneous performance perceived by end-users. We define a set of metrics for service avai...
Ram Keralapura, Chen-Nee Chuah, Gianluca Iannaccon...
CVPR
2003
IEEE
14 years 29 days ago
A Perspective on Distortions
A framework for analyzing distortions in non-single viewpoint imaging systems is presented. Such systems possess loci of viewpoints called caustics. In general, perspective (or un...
Rahul Swaminathan, Michael D. Grossberg, Shree K. ...
ECRTS
2003
IEEE
14 years 29 days ago
Using Supertasks to Improve Processor Utilization in Multiprocessor Real-Time Systems
We revisit the problem of supertasking in Pfair-scheduled multiprocessor systems. In this approach, a set of tasks, called component tasks, is assigned to a server task, called a ...
Philip Holman, James H. Anderson
« Prev « First page 1048 / 1109 Last » Next »