Sciweavers

885 search results - page 149 / 177
» An investigation of the performance of various dynamic sched...
Sort
View
ICCAD
2001
IEEE
124views Hardware» more  ICCAD 2001»
14 years 5 months ago
Partition-Based Decision Heuristics for Image Computation Using SAT and BDDs
Methods based on Boolean satisfiability (SAT) typically use a Conjunctive Normal Form (CNF) representation of the Boolean formula, and exploit the structure of the given problem ...
Aarti Gupta, Zijiang Yang, Pranav Ashar, Lintao Zh...
APSEC
2009
IEEE
14 years 2 days ago
Sequence Diagram Slicing
Software visualization with sequence diagrams is one of the promising techniques aimed at helping developers comprehend the behavior of object-oriented systems effectively. However...
Kunihiro Noda, Takashi Kobayashi, Kiyoshi Agusa, S...
STACS
1997
Springer
14 years 24 days ago
Methods and Applications of (MAX, +) Linear Algebra
Exotic semirings such as the “(max, +) semiring” (R ∪ {−∞}, max, +), or the “tropical semiring” (N ∪ {+∞}, min, +), have been invented and reinvented many times s...
Stephane Gaubert, Max Plus
NETWORKING
2007
13 years 10 months ago
Path Selection Using Available Bandwidth Estimation in Overlay-Based Video Streaming
IP networks present a challenging environment for video streaming because they do not provide throughput, jitter, or loss rate guarantees. In this work, we focus on improving the p...
Manish Jain, Constantine Dovrolis
EUROSYS
2009
ACM
14 years 5 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos