Search
Now showing items 141-150 of 206
A hardware testbed for measuring IEEE 802.11g DCF performance
(2009)
The Distributed Coordination Function (DCF) is the oldest and most widely-used IEEE 802.11 contention-based channel access control protocol. DCF adds a significant amount of overhead in the form of preambles, frame headers, ...
Distributed shared memory for virtual environments
(1997)
This work investigated making virtual environments easier to program, by designing a suitable distributed shared memory system. To be usable, the system must keep latency to a minimum, as virtual environments are very ...
Visualizing the memory performance of parallel programs with Chiron
(1996)
This thesis describes Chiron, visualization system which helps programmers detect memory system bottlenecks in their shared-memory parallel applications. Chiron is different from most other performance debugging tools in ...
Bottom-up evaluation of HiLog in the context of deductive database systems
(1998)
HiLog is a logic-based language which boasts the expressiveness of a higher-order syntax while retaining the simplicity of a first-order semantics. This work examines the suitability of Horn-clause HiLog as a query language ...
High-level control of agent-based crowds by means of general constraints
(2009)
The use of computer-generated crowds in visual effects has grown tremendously since the warring armies of virtual ores and elves were seen in The Lord of the Rings. These crowds are generated by agent-based simulations, ...
Pattern recognition and the nondeterminable affine parameter problem
(1998)
This thesis reports on the process of implementing pattern recognition systems using classification models such as artificial neural networks (ANNs) and algorithms whose theoretical foundations come from statistics. The ...
A transaction assurance framework for web services
(2007)
Trust assurances for customers of online transactions is an important, but not well implemented concept for the growth of confidence in electronic transactions. In an online world where customers do not personally know the ...
Situation recognition using soft computing techniques
(2012)
The last decades have witnessed the emergence of a large number of devices pervasively launched into our daily lives as systems producing and collecting data from a variety of information sources to provide different ...
Adapting a novel public display system for an educational context
(2010)
Universities in developing nations are viewed as gateways to global knowledge and as the source of human capital for their countries' economies (Juma, 2008). However, these universities face challenges in accessing educational ...
Fast and accurate visibility preprocessing
(2003)
Currently, the standard approach to visibility preprocessing algorithms is to use a form of approximate solution, known as conservative culling. Such algorithms over-estimate the set of visible polygons. This compromise ...