Sciweavers

396 search results - page 51 / 80
» Argument Controlled Profiling
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Making Large Scale Deployment of RCP Practical for Real Networks
—We recently proposed the Rate Control Protocol (RCP) as a way to minimize download times (or flow-completion times). Simulations suggest that if RCP were widely deployed, downl...
Chia-Hui Tai, Jiang Zhu, Nandita Dukkipati
PPDP
2009
Springer
14 years 2 months ago
Set functions for functional logic programming
We propose a novel approach to encapsulate non-deterministic computations in functional logic programs. Our approach is based on set functions that return the set of all the resul...
Sergio Antoy, Michael Hanus
ICRA
2008
IEEE
164views Robotics» more  ICRA 2008»
14 years 2 months ago
Bilateral energy transfer in delayed teleoperation on the time domain
— The time domain passivity framework is attracting interest as a method for granting stability in both telerobotics and haptic contexts; this paper employs this approach in orde...
Jordi Artigas, Carsten Preusche, Gerd Hirzinger, G...
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 2 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
COMPSAC
2007
IEEE
14 years 2 months ago
Architecture-Based Software Reliability: Why Only a Few Parameters Matter?
Uncertainty analysis through sensitivity studies and quantification of the variance of the reliability estimate has become more common in architecture-based software reliability ...
Katerina Goseva-Popstojanova, Margaret Hamill