Sciweavers

1414 search results - page 211 / 283
» Cover Time and Broadcast Time
Sort
View
CAV
2009
Springer
116views Hardware» more  CAV 2009»
14 years 11 months ago
Meta-analysis for Atomicity Violations under Nested Locking
Abstract. We study the problem of determining, given a run of a concurrent program, whether there is any alternate execution of it that violates atomicity, where atomicity is defin...
Azadeh Farzan, P. Madhusudan, Francesco Sorrentino
CHI
2003
ACM
14 years 11 months ago
Human on-line response to target expansion
McGuffin and Balakrishnan (M&B) have recently reported evidence that target expansion during a reaching movement reduces pointing time even if the expansion occurs as late as ...
Michel Beaudouin-Lafon, Shumin Zhai, Stépha...
STOC
2004
ACM
126views Algorithms» more  STOC 2004»
14 years 11 months ago
Bypassing the embedding: algorithms for low dimensional metrics
The doubling dimension of a metric is the smallest k such that any ball of radius 2r can be covered using 2k balls of raThis concept for abstract metrics has been proposed as a na...
Kunal Talwar
CIAC
2010
Springer
251views Algorithms» more  CIAC 2010»
14 years 8 months ago
A parameterized algorithm for Chordal Sandwich
Given an arbitrary graph G = (V, E) and an additional set of admissible edges F, the Chordal Sandwich problem asks whether there exists a chordal graph (V, E F ) such that F F. ...
Pinar Heggernes, Federico Mancini, Jesper Nederlof...
ICCD
2005
IEEE
119views Hardware» more  ICCD 2005»
14 years 8 months ago
Deployment of Better Than Worst-Case Design: Solutions and Needs
The advent of nanometer feature sizes in silicon fabrication has triggered a number of new design challenges for computer designers. These challenges include design complexity and...
Todd M. Austin, Valeria Bertacco