Sciweavers

107 search results - page 15 / 22
» Dependable Polygon-Processing Algorithms for Safety-Critical...
Sort
View
IJPP
2008
74views more  IJPP 2008»
13 years 7 months ago
Bandwidth Efficient All-to-All Broadcast on Switched Clusters
We develop an all-to-all broadcast scheme that achieves maximum bandwidth efficiency for clusters with tree topologies. Using our scheme for clusters with cut-through switches, an...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan
ICRA
2003
IEEE
94views Robotics» more  ICRA 2003»
14 years 28 days ago
Enveloping obstacles with hexagonal metamorphic robots
Abstract— The problem addressed is the distributed reconfiguration of a metamorphic robot system composed of any number of two dimensional robots (modules). The initial configu...
Jennifer E. Walter, Elizabeth M. Tsai, Nancy M. Am...
DAC
2003
ACM
14 years 8 months ago
Scalable modeling and optimization of mode transitions based on decoupled power management architecture
To save energy, many power management policies rely on issuing mode-change commands to the components of the system. Efforts to date have focused on how these policies interact wi...
Dexin Li, Qiang Xie, Pai H. Chou
RTCSA
2000
IEEE
14 years 15 hour ago
Task attribute assignment of fixed priority scheduled tasks to reenact off-line schedules
A number of industrial applications advocate the use of time-triggered approaches for reasons of predictability, distribution, and particular constraints such as jitter or end-to-...
Radu Dobrin, Yusuf Özdemir, Gerhard Fohler
DRM
2003
Springer
14 years 26 days ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia