نتایج جستجو برای: idle
تعداد نتایج: 5016 فیلتر نتایج به سال:
In realistic looking game environments it is important that virtual characters behave naturally. Our goal is to produce naturally looking gaze behavior for animated agents and avatars that are simply idling. We studied people standing and waiting, as well as people walking down a shopping street. From our observations we built a demo with the CADIA Populus multi-agent social simulation platform.
Many sensor network applications feature bursty traffic patterns: after long periods of idle time with almost no network traffic, large amounts of data have to be transmitted reliably and in a timely manner. One example is volcano monitoring [8], where precious high-volume data is generated by rare volcanic eruptions. Unfortunately, existing MAC protocols do not sufficiently support such applic...
Speculative execution is a technique by which instructions are executed before the condition that controls it is evaluated. This can increase the performance if some of the idle cpu cycles are now used to execute speculated instructions. Guarded execution is a technique in which the branch instruction is eliminated and control dependences are converted to data dependences. This can help reduce ...
A new design for two-hop opportunistic relaying in cellular networks is proposed, with the objective of throughput improvement. We propose using idle UEs in a cellular system with better channel to the base station to relay traffic for active UEs. One of the key ideas proposed is the use of (only) uplink spectrum for the Access links, and corresponding interference management schemes for managi...
WiFi is a common communication interface for smart devices. WiFi still has some perturbation such as: – Poor utilization of wireless channel. – Energy consumption during idle state. – Unfairness issue due to capture effect.
Capacity planning is a major challenge for service providers facing volatile demand. Inefficiencies result from idle capacity or lost revenue caused by peak loads. Concerning IT-driven services, recent technological developments offering dynamic integration and information capabilities may help. They enable an on-demand exchange of excess capacity between business partners and create value thro...
Each and every application in android requires respective user approval for providing permission to app to install. Suppose each and every one the consents are accepted the application is installed and takes delivery of the assemblage association. Throughout runtime, the permissions are checkered by the collection association. The gone astray permissions will grounds the request to smash into a...
The ability to make intelligent decisions with respect to reducing the energy consumption of mechanical disk drives is dependent upon accurately tracking and accounting the runtime energy consumption of the mechanical and electrical components of the drive in both active and idle states. This work outlines a simple methodology for creating accurate hard drive runtime energy models through the u...
This paper presents a MAC protocol which uses separate wakeup slots for each sensor node in sensor networks. Most MAC protocols proposed for sensor network are inefficient under heavy traffic loads, in particular in high density network topology because of frequent collisions and long sleep latency. In this paper, we suggest a MAC protocol in which each node has a different wakeup schedule in t...
With the recent emergence of open source course management systems, learning support infrastructures have received increased attention. More and more organisations adopt these systems to provide their educational services. Often, existing, locally developed learning support software – ranging from delivery support to multimedia content – have to be integrated into these new systems. We will rep...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید