Sciweavers

1477 search results - page 254 / 296
» Token flow control
Sort
View
WACC
1999
ACM
14 years 1 months ago
Coordinating agent activities in knowledge discovery processes
Knowledge discovery in databases (KDD) is an increasingly widespread activity. KDD processes may entail the use of a large number of data manipulation and analysis techniques, and...
David Jensen, Yulin Dong, Barbara Staudt Lerner, E...
ICDCS
1999
IEEE
14 years 1 months ago
Fault Tolerant Video on Demand Services
This paper describes a highly available distributedvideo on demand (VoD) service which is inherently fault tolerant. The VoD service is provided by multiple servers that reside at...
Tal Anker, Danny Dolev, Idit Keidar
ICPP
1999
IEEE
14 years 29 days ago
Adaptive Bubble Router: A Design to Improve Performance in Torus Networks
A router design for torus networks that significantly reduces message latency over traditional wormhole routers is presented in this paper. This new router implements virtual cut-...
Valentin Puente, Ramón Beivide, José...
ISCA
1999
IEEE
87views Hardware» more  ISCA 1999»
14 years 29 days ago
Dynamic Vectorization: A Mechanism for Exploiting Far-Flung ILP in Ordinary Programs
Several ILP limit studies indicate the presence of considerable ILP across dynamically far-apart instructions in program execution. This paper proposes a hardware mechanism, dynam...
Sriram Vajapeyam, P. J. Joseph, Tulika Mitra
ITC
1999
IEEE
107views Hardware» more  ITC 1999»
14 years 29 days ago
A high-level BIST synthesis method based on a region-wise heuristic for an integer linear programming
A high-level built-in self-test (BIST) synthesis involves several tasks such as system register assignment, interconnection assignment, and BIST register assignment. Existing high...
Han Bin Kim, Dong Sam Ha