Results 1 - 10
of
210,119
The tera computer system
- in Proc. Int'l Conf. Supercomputing
, 1990
"... describe the present status of the computing system in the Belle experiment at the KEKB e þ e asymmetric-energy collider. So far, we have logged more than 160 fb 1 of data, corresponding to the world’s largest data sample of 170 M BB pairs at the Uð4SÞ energy region. A large amount of event data has ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
describe the present status of the computing system in the Belle experiment at the KEKB e þ e asymmetric-energy collider. So far, we have logged more than 160 fb 1 of data, corresponding to the world’s largest data sample of 170 M BB pairs at the Uð4SÞ energy region. A large amount of event data
Exploiting Parallelism:The Tera Computer System and the Multiscalar Processors
"... Abstract--Parallelism introduces complexities both in hardware and in software. Studying the Tera Computer System and the multiscalar processor gives us a glimpse of these. I. ..."
Abstract
- Add to MetaCart
Abstract--Parallelism introduces complexities both in hardware and in software. Studying the Tera Computer System and the multiscalar processor gives us a glimpse of these. I.
Location Systems for Ubiquitous Computing
, 2001
"... This survey and taxonomy of location systems for mobile-computing applications describes... ..."
Abstract
-
Cited by 954 (19 self)
- Add to MetaCart
This survey and taxonomy of location systems for mobile-computing applications describes...
The protection of information in computer systems
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sectio ..."
Abstract
-
Cited by 824 (2 self)
- Add to MetaCart
of protecting information in computers. Access The ability to make use of information stored in a computer system. Used frequently as a verb, to the horror of grammarians. Access control list A list of principals that are authorized to have access to some object. Authenticate To verify the identity of a person
Computer Vision
, 1982
"... Driver inattention is one of the main causes of traffic accidents. Monitoring a driver to detect inattention is a complex problem that involves physiological and behavioral elements. Different approaches have been made, and among them Computer Vision has the potential of monitoring the person behind ..."
Abstract
-
Cited by 1041 (11 self)
- Add to MetaCart
Driver inattention is one of the main causes of traffic accidents. Monitoring a driver to detect inattention is a complex problem that involves physiological and behavioral elements. Different approaches have been made, and among them Computer Vision has the potential of monitoring the person
Boinc: A system for public-resource computing and storage
- 5th IEEE/ACM International Workshop on Grid Computing
, 2004
"... ..."
Pervasive Computing: Vision and Challenges
- IEEE Personal Communications
, 2001
"... This paper discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smar ..."
Abstract
-
Cited by 686 (22 self)
- Add to MetaCart
This paper discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use
Context-Aware Computing Applications
, 1995
"... This paper describes systems that examine and react to an individual's changing context. Such systems can promote and mediate people's mleractlOns with devices, computers, and other people, and they can help navigate unfamiliar places. We bel1eve that a lunded amount of information coveTIn ..."
Abstract
-
Cited by 984 (6 self)
- Add to MetaCart
This paper describes systems that examine and react to an individual's changing context. Such systems can promote and mediate people's mleractlOns with devices, computers, and other people, and they can help navigate unfamiliar places. We bel1eve that a lunded amount of information cove
A Bayesian computer vision system for modeling human interactions
- IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 2000
"... We describe a real-time computer vision and machine learning system for modeling and recognizing human behaviors in a visual surveillance task [1]. The system is particularly concerned with detecting when interactions between people occur and classifying the type of interaction. Examples of interes ..."
Abstract
-
Cited by 538 (6 self)
- Add to MetaCart
We describe a real-time computer vision and machine learning system for modeling and recognizing human behaviors in a visual surveillance task [1]. The system is particularly concerned with detecting when interactions between people occur and classifying the type of interaction. Examples
GPFS: A Shared-Disk File System for Large Computing Clusters
- In Proceedings of the 2002 Conference on File and Storage Technologies (FAST
, 2002
"... GPFS is IBM's parallel, shared-disk file system for cluster computers, available on the RS/6000 SP parallel supercomputer and on Linux clusters. GPFS is used on many of the largest supercomputers in the world. GPFS was built on many of the ideas that were developed in the academic community ove ..."
Abstract
-
Cited by 521 (3 self)
- Add to MetaCart
GPFS is IBM's parallel, shared-disk file system for cluster computers, available on the RS/6000 SP parallel supercomputer and on Linux clusters. GPFS is used on many of the largest supercomputers in the world. GPFS was built on many of the ideas that were developed in the academic community
Results 1 - 10
of
210,119