Sciweavers

5766 search results - page 1042 / 1154
» Reverse Engineering of Data
Sort
View
144
Voted
CAL
2006
15 years 4 months ago
A Case for Compressing Traces with BDDs
Instruction-level traces are widely used for program and hardware analysis. However, program traces for just a few seconds of execution are enormous, up to several terabytes in siz...
Graham D. Price, Manish Vachharajani
131
Voted
CGF
2006
128views more  CGF 2006»
15 years 4 months ago
Computing discrete shape operators on general meshes
Discrete curvature and shape operators, which capture complete information about directional curvatures at a point, are essential in a variety of applications: simulation of defor...
Eitan Grinspun, Yotam I. Gingold, Jason Reisman, D...
CN
2006
107views more  CN 2006»
15 years 4 months ago
BGP session lifetime modeling in congested networks
The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism ...
Li Xiao, Guanghui He, Klara Nahrstedt
COMCOM
2006
134views more  COMCOM 2006»
15 years 4 months ago
On the deployment of VoIP in Ethernet networks: methodology and case study
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step method...
Khaled Salah
CORR
2006
Springer
93views Education» more  CORR 2006»
15 years 4 months ago
Constructing experimental indicators for Open Access documents
The ongoing paradigm change in the scholarly publication system (`science is turning to e-science') makes it necessary to construct alternative evaluation criteria/metrics wh...
Philipp Mayr
« Prev « First page 1042 / 1154 Last » Next »