Sciweavers

7189 search results - page 89 / 1438
» Connecting Design with Code
Sort
View
ICSE
2004
IEEE-ACM
16 years 2 months ago
Assume-Guarantee Verification of Source Code with Design-Level Assumptions
Model checking is an automated technique that can be used to determine whether a system satisfies certain required properties. To address the "state explosion" problem a...
Dimitra Giannakopoulou, Corina S. Pasareanu, Jamie...
113
Voted
ICC
2009
IEEE
15 years 9 months ago
A New Efficient Mechanism for Establishing IP Connectivity between Ambient Networks
—The changes in the communication paradigm envisioned for future networks, with peer-to-peer/symmetric attachments gaining momentum and two IP (Internet Protocol) versions coexis...
Rui Campos, Manuel Ricardo
114
Voted
DSN
2003
IEEE
15 years 7 months ago
TCP Server Fault Tolerance Using Connection Migration to a Backup Server
This paper describes the design, implementation, and performance evaluation of ST-TCP (Server fault-Tolerant TCP), which is an extension of TCP to tolerate TCP server failures. Th...
Manish Marwah, Shivakant Mishra, Christof Fetzer
ICNP
2002
IEEE
15 years 7 months ago
pTCP: An End-to-End Transport Layer Protocol for Striped Connections
The TCP transport layer protocol is designed for connections that traverse a single path between the sender and receiver. However, there are several environments in which multiple...
Hung-Yun Hsieh, Raghupathy Sivakumar
129
Voted
SODA
2008
ACM
131views Algorithms» more  SODA 2008»
15 years 3 months ago
Approximating connected facility location problems via random facility sampling and core detouring
We present a simple randomized algorithmic framework for connected facility location problems. The basic idea is as follows: We run a black-box approximation algorithm for the unc...
Friedrich Eisenbrand, Fabrizio Grandoni, Thomas Ro...