Sciweavers

328 search results - page 34 / 66
» Deterministic k-set structure
Sort
View
CCS
2007
ACM
14 years 1 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
CPAIOR
2007
Springer
14 years 1 months ago
Modeling the Regular Constraint with Integer Programming
Many optimisation problems contain substructures involving constraints on sequences of decision variables. Such constraints can be very complex to express with mixed integer progra...
Marie-Claude Côté, Bernard Gendron, L...
IPPS
2006
IEEE
14 years 1 months ago
A calculus of functional BSP programs with projection
Bulk Synchronous Parallel ML (BSML) is an extension of the functional language Objective Caml to program Bulk Synchronous Parallel (BSP) algorithms. It is deterministic, deadlock ...
Frédéric Loulergue
ISCAS
2005
IEEE
153views Hardware» more  ISCAS 2005»
14 years 29 days ago
A two-step DDEM ADC for accurate and cost-effective DAC testing
— This paper presents a scheme for testing DACs’ static non-linearity errors by using a two-step flash ADC with deterministic dynamic element matching (DDEM). In this work, the...
Hanqing Xing, Degang Chen, Randall L. Geiger
INFOCOM
2002
IEEE
14 years 9 days ago
Probabilistic Location and Routing
Abstract—We propose probabilistic location to enhance the performance of existing peer-to-peer location mechanisms in the case where a replica for the queried data item exists cl...
Sean C. Rhea, John Kubiatowicz