A standard technique from the hashing literature is to use two hash functions h1(x) and h2(x) to simulate additional hash functions of the form gi(x) = h1(x) + ih2(x). We demonstra...
Abstract. Tracing computations is a widely used methodology for program debugging. Lazy languages, however, pose new demands on tracing techniques because following the actual trac...
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
Clusters have made the jump from lab prototypes to fullfledged production computing platforms. The number, variety, and specialized configurations of these machines are increasi...
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...