Sciweavers

1629 search results - page 279 / 326
» Infeasible Code Detection
Sort
View
AOSD
2007
ACM
14 years 2 months ago
Declarative failure recovery for sensor networks
Wireless sensor networks consist of a system of distributed sensors embedded in the physical world, and promise to allow observation of previously unobservable phenomena. Since th...
Ramakrishna Gummadi, Nupur Kothari, Todd D. Millst...
BIBE
2007
IEEE
208views Bioinformatics» more  BIBE 2007»
14 years 2 months ago
The GPU on biomedical image processing for color and phenotype analysis
The computational power and memory bandwidth of graphics processing units (GPUs) have turned them into attractive platforms for general-purpose applications. In this paper, we expl...
Antonio Ruiz, Manuel Ujaldon, Jose Antonio Andrade...
ICC
2007
IEEE
229views Communications» more  ICC 2007»
14 years 2 months ago
A Cross-Layer Design on the Basis of Multiple Packet Reception in Asynchronous Wireless Network
This paper concerns the cross-layer design between physical layer and MAC (Multiple Access Control) layer in asynchronous wireless random access network. The proposed cross-layer d...
Anxin Li, Mingshu Wang, Xiangming Li, Hidetoshi Ka...
CGO
2004
IEEE
14 years 1 months ago
Probabilistic Predicate-Aware Modulo Scheduling
Predicated execution enables the removal of branches by converting segments of branching code into sequences of conditional operations. An important side effect of this transforma...
Mikhail Smelyanskiy, Scott A. Mahlke, Edward S. Da...
COMPSAC
2004
IEEE
14 years 1 months ago
Robustness Study of an Embedded Operating System for Industrial Applications
Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour in spite of the appearance of errors. ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...