Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Scalable and Crash-Tolerant Load Balancing Based on Switch Migration for Multiple Open Flow Controllers
Chu Liang, Kawashima, Ryota, Matsuo, Hiroshi
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Loading…
Nerve Net: A Regional-Area Network for Resilient Local Information Sharing and Communications
Inoue, Masugi, Owada, Yasunori, Hamaguti, Kiyoshi, Miura, Ryu
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
An Efficient Implementation of the One-Dimensional Hough Transform Algorithm for Circle Detection on the FPGA
Xin Zhou, Ito, Yasuaki, Nakano, Koji
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Community Detection Based on Graph Dynamical Systems with Asynchronous Runs
Jiamou Liu, Ziheng Wei
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Towards Transparently Tackling Functionality and Performance Issues across Different OpenCL Platforms
Agosta, Giovanni, Barenghi, Alessandro, Pelosi, Gerardo, Scandale, Michele
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Loading…
Towards a Complete Rule-Based Classification Approach for Flat Fingerprints
Webb, Leandra, Mathekga, Mmamolatelo
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Software Model Checking of UDP-based Distributed Applications
Sebih, Nazim, Weitl, Franz, Artho, Cyrille, Hagiya, Masami, Tanabe, Yoshinori, Yamamoto, Mitsuharu
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
A Time Optimal Parallel Algorithm for the Dynamic Programming on the Hierarchical Memory Machine
Nakano, Koji
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Truthful Allocation of Virtual Machine Instances with the Notion of Combinatorial Auction
Srinivasan, Kasthuri, Fujita, Satoshi
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
A Preliminarily Evaluation of PEACH3: A Switching Hub for Tightly Coupled Accelerators
Kuhara, Takuya, Kaneda, Takahiro, Hanawa, Toshihiro, Kodama, Yuetsu, Boku, Taisuke, Amano, Hideharu
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Robot Vehicle Platoon Experiment Based on Multi-leader Vehicle Following Model
Kita, Eisuke, Sakamoto, Hiroki, Takaue, Hiroto, Yamada, Miichiro
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Hybrid Visualization of Sparse Point-Based Data Using GPGPU
Lukac, Niko, Pelic, Denis, Alik, Borut
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Fractal Patterns Created by Ulam's Cellular Automaton
Kawaharada, Akane
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
On the Composition of Signals in Gellular Automata
Shaoyu Wang, Imai, Katsunobu, Hagiya, Masami
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Online Memory Access Pattern Analysis on an Application Profiling Tool
Matsubara, Yuki, Sato, Yukinori
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Improved Routing in the Data Centre Networks HCN and BCN
Stewart, Iain A.
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding
Loading…
Loading…
An Access Control Framework for Semi-trusted Storage Using Attribute-Based Encryption with Short Ciphertext and Mediated Revocation
Figueroa, Kathleen Gay, Pancho-Festin, Susan
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Published in 2014 Second International Symposium on Computing and Networking (01.12.2014)
Get full text
Conference Proceeding