Skip to main content

Page of 2 next disabled
and
  1. No Access

    Chapter and Conference Paper

    A Simulation Study Comparing the Performance of Two RFID Protocols

    This paper presents a comparison of version 1.0 Protocol Specification for 900MHz Class 0 RFID Tag with that of Class-1 Generation 2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz for large number o...

    Mamatha Nanjundaiah, Vipin Chaudhary in Ubiquitous Intelligence and Computing (2006)

  2. No Access

    Chapter and Conference Paper

    Ubisafe Computing: Vision and Challenges (I)

    In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of the...

    Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, **gde Cheng in Autonomic and Trusted Computing (2006)

  3. No Access

    Chapter and Conference Paper

    Application-Level Checkpointing Techniques for Parallel Programs

    In its simplest form, checkpointing is the act of saving a program’s computation state in a form external to the running program, e.g. the computation state is saved to a filesystem. The checkpoint files can t...

    John Paul Walters, Vipin Chaudhary in Distributed Computing and Internet Technology (2006)

  4. No Access

    Chapter and Conference Paper

    On Tools for Modeling High-Performance Embedded Systems

    Most of the new embedded systems require high performance pro- cessors at low power. To cater to these needs, most semiconductor companies are designing multi-core processors, also known as chip-multiprocessor...

    Anilkumar Nambiar, Vipin Chaudhary in Embedded and Ubiquitous Computing – EUC 2005 (2005)

  5. No Access

    Chapter and Conference Paper

    On Implementation of MPEG-2 Like Real-Time Parallel Media Applications on MDSP SoC Cradle Architecture

    In this paper we highlight the suitability of MDSP architecture to exploit the data, algorithmic, and pipeline parallelism offered by video processing algorithms like the MPEG-2 for real-time performance. Most...

    Ganesh Yadav, R. K. Singh, Vipin Chaudhary in Embedded and Ubiquitous Computing (2004)

  6. No Access

    Chapter and Conference Paper

    Thread Migration/Checkpointing for Type-Unsafe C Programs

    Thread migration/checkpointing is becoming indispensable for load balancing and fault tolerance in high performance computing applications, and its success depends on the migration/checkpointing-safety, which ...

    Hai Jiang, Vipin Chaudhary in High Performance Computing - HiPC 2003 (2003)

  7. No Access

    Chapter and Conference Paper

    A Practical OpenMP Compiler for System on Chips

    With the advent of modern System-on-Chip (SOC) design, the integration of multiple-processors into one die has become the trend. By far there are no standard programming paradigms for SOCs or heterogeneous chi...

    Feng Liu, Vipin Chaudhary in OpenMP Shared Memory Parallel Programming (2003)

  8. No Access

    Chapter and Conference Paper

    On Improving Thread Migration: Safety and Performance

    Application-level migration schemes have been paid more attention recently because of their great potential for heterogeneous migration. But they are facing an obstacle that few migration-unsafe features in ce...

    Hai Jiang, Vipin Chaudhary in High Performance Computing — HiPC 2002 (2002)

  9. No Access

    Article

    Design issues for a high-performance distributed shared memory on symmetrical multiprocessor clusters

    Clusters of Symmetrical Multiprocessors (SMPs) have recently become the norm for high-performance economical computing solutions. Multiple nodes in a cluster can be used for parallel programming using a messag...

    Sumit Roy, Vipin Chaudhary in Cluster Computing (1999)

  10. No Access

    Chapter and Conference Paper

    A Fission Technique Enabling Parallelization of Imperfectly Nested Loops

    This paper addresses the issue of parallelizing imperfectly nested loops. Current parallelizing compilers or transformations would either only parallelize the inner-most loop (which is more like vectorization ...

    Jialin Ju, Vipin Chaudhary in High Performance Computing – HiPC’99 (1999)

  11. No Access

    Chapter and Conference Paper

    Modeling Cone-Beam Tomographic Reconstruction Using LogSMP: An Extended LogP Model for Clusters of SMPs

    The tomographic reconstruction for cone-beam geometries is a computationally intensive task requiring large memory and computational power to investigate interesting objects. The analysis of its parallel imple...

    David A. Reimann, Vipin Chaudhary, Ishwar K. Sethi in High Performance Computing – HiPC’99 (1999)

  12. No Access

    Chapter

    History-Based Access Control for Mobile Code

    In this chapter, we present a history-based access-control mechanism that is suitable for mediating accesses from mobile code. The key idea behind history-based access-control is to maintain a selective history o...

    Guy Edjlali, Anurag Acharya, Vipin Chaudhary in Secure Internet Programming (1999)

  13. No Access

    Chapter and Conference Paper

    Parallel manipulations of octrees and quadtrees

    Octrees offer a powerful means for representing and manipulating 3-D objects. This paper presents an implementation of octree manipulations using a new approach on a shared memory architecture. Octrees are hie...

    Vipin Chaudhary, K. Kamath, P. Arunachalam, J. K. Aggarwal in Parallel Image Analysis (1992)

  14. No Access

    Chapter

    Parallelism in Computer Vision: a Review

    Computer vision tasks require an enormous amount of computation, especially when the data is in image form, demanding high-performance computers for practical, real-time applications. Parallelism appears to be...

    Vipin Chaudhary, J. K. Aggarwal in Parallel Algorithms for Machine Intelligence and Vision (1990)

  15. No Access

    Chapter

    Parallelism in Low-Level Computer Vision — A Review

    In this paper we review various parallel algorithms and architectures used in Computer Vision. The problem of visual recognition is divided into three conceptual levels — low-level, intermediate-level and high...

    Vipin Chaudhary, J. K. Aggarwal in Data Analysis in Astronomy III (1989)

Page of 2 next disabled