Sciweavers

435 search results - page 85 / 87
» fit 2010
Sort
View
EJC
2010
13 years 9 months ago
On loop identities that can be obtained by a nuclear identification
We start by describing all the varieties of loops Q that can be defined by autotopisms x, x Q, where x is a composition of two triples, each of which becomes an autotopism when th...
Ales Drápal, Premysl Jedlicka
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 8 months ago
Maximum Bipartite Matching Size And Application to Cuckoo Hashing
Cuckoo hashing with a stash is a robust high-performance hashing scheme that can be used in many real-life applications. It complements cuckoo hashing by adding a small stash stor...
Josef Kanizo, David Hay, Isaac Keslassy
INTERNET
2010
170views more  INTERNET 2010»
13 years 7 months ago
Developing RESTful Web Services with Webmachine
bstractions and mechanisms Webmachine supplies to RESTful Web services developers. Not Your Typical Framework Web services frameworks typically fall into one of the following broad...
Justin Sheehy, Steve Vinoski
MMS
2010
13 years 7 months ago
Asynchronous reflections: theory and practice in the design of multimedia mirror systems
-- In this paper, we present a theoretical framing of the functions of a mirror by breaking the synchrony between the state of a reference object and its reflection. This framing p...
Wei Zhang, Bo Begole, Maurice Chu
TC
2010
13 years 7 months ago
PERFECTORY: A Fault-Tolerant Directory Memory Architecture
—The number of CPUs in chip multiprocessors is growing at the Moore’s Law rate, due to continued technology advances. However, new technologies pose serious reliability challen...
Hyunjin Lee, Sangyeun Cho, Bruce R. Childers