Sciweavers

2875 search results - page 524 / 575
» Using separation of concerns for embedded systems design
Sort
View
125
Voted
WSC
2004
15 years 5 months ago
Applying Statistical Control Techniques to Air Traffic Simulations
While the literature contains several adaptive sampling techniques for statistical comparison of competing simulated system configurations and for embedded statistical computation...
Kirk C. Benson, David Goldsman, Amy R. Pritchett
120
Voted
SIAMDM
1998
86views more  SIAMDM 1998»
15 years 3 months ago
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
In this paper, we investigate combinatorialproperties and constructions of two recent topics of cryptographic interest, namely frameproof codes for digital ngerprinting, and trace...
Douglas R. Stinson, Ruizhong Wei
147
Voted
PC
2007
112views Management» more  PC 2007»
15 years 3 months ago
Service address routing: a network-embedded resource management layer for cluster computing
Service address routing is introduced as a novel and powerful paradigm for the integration of resource management functions into the interconnection fabric of cluster computers. S...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...
130
Voted
CIKM
2010
Springer
15 years 2 months ago
StableBuffer: optimizing write performance for DBMS applications on flash devices
Flash devices have been widely used in embedded systems, laptop computers, and enterprise servers. However, the poor random writes have been an obstacle to running write-intensive...
Yu Li, Jianliang Xu, Byron Choi, Haibo Hu
120
Voted
ICCV
1998
IEEE
16 years 5 months ago
Retrieving Images by Appearance
A system to retrieve images using a description of the image intensity surface is presented. Gaussian derivative lters at several scales are applied to the image and low order 2D ...
S. Ravela, R. Manmatha