Sciweavers

1852 search results - page 347 / 371
» From Bi-ideals to Periodicity
Sort
View
USENIX
2008
13 years 11 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
COMPGEOM
2008
ACM
13 years 10 months ago
Untangling triangulations through local explorations
In many applications it is often desirable to maintain a valid mesh within a certain domain that deforms over time. During a period for which the underlying mesh topology remains ...
Pankaj K. Agarwal, Bardia Sadri, Hai Yu
ELPUB
2008
ACM
13 years 10 months ago
Open Access Citation Rates and Developing Countries
Academics, having written their peer reviewed articles, may at some stage in the make their work Open Access (OA). They can do this by self-archiving an electronic version of thei...
Michael Norris, Charles Oppenheim, Fytton Rowland
ESANN
2007
13 years 10 months ago
Structured reservoir computing with spatiotemporal chaotic attractors
Abstract. We approach the themes “computing with chaos” and “reservoir computing” in a unified setting. Different neural architectures are mentioned which display chaotic...
Carlos Lourenço
IM
2007
13 years 10 months ago
Robust Monitoring of Network-wide Aggregates through Gossiping
Abstract—We investigate the use of gossip protocols for continuous monitoring of network-wide aggregates under crash failures. Aggregates are computed from local management varia...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...