Sciweavers

1094 search results - page 60 / 219
» One Size Fits All
Sort
View
SAC
2005
ACM
14 years 3 months ago
A code compression advisory tool for embedded processors
We present a tool which is designed to be used as a code compression advisory system for object code to be run on an embedded processor. All the compression schemes support run-ti...
Sreejith K. Menon, Priti Shankar
SODA
2001
ACM
166views Algorithms» more  SODA 2001»
13 years 11 months ago
Better approximation algorithms for bin covering
Bin covering takes as input a list of items with sizes in (0 1) and places them into bins of unit demand so as to maximize the number of bins whose demand is satis ed. This is in ...
János Csirik, David S. Johnson, Claire Keny...
CCR
2004
86views more  CCR 2004»
13 years 10 months ago
IPv4 address allocation and the BGP routing table evolution
The IP address consumption and the global routing table size are two of the vital parameters of the Internet growth. In this paper we quantitatively characterize the IPv4 address ...
Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Hu...
COMCOM
2008
103views more  COMCOM 2008»
13 years 10 months ago
Fast reroute with pre-established bypass tunnel in MPLS
Internet IP networks utilize multiple-protocol label switching (MPLS), which provides a reliable label switched path (LSP). LSP in MPLS domains needs one label at each Ingress lab...
Wei Kuang Lai, Zhen Chang Zheng, Chen-Da Tsai
JCC
2011
154views more  JCC 2011»
13 years 28 days ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...