Sciweavers

1336 search results - page 235 / 268
» SMTP Path Analysis
Sort
View
POPL
2003
ACM
14 years 9 months ago
Discovering affine equalities using random interpretation
We present a new polynomial-time randomized algorithm for discovering affine equalities involving variables in a program. The key idea of the algorithm is to execute a code fragme...
Sumit Gulwani, George C. Necula
LCTRTS
2009
Springer
14 years 3 months ago
A compiler optimization to reduce soft errors in register files
Register file (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes to protect the RF are prohibitive not only because RF is often in the timing c...
Jongeun Lee, Aviral Shrivastava
WDAG
2009
Springer
114views Algorithms» more  WDAG 2009»
14 years 3 months ago
Virtual Ring Routing Trends
Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from dis...
Dahlia Malkhi, Siddhartha Sen, Kunal Talwar, Renat...
FGCN
2008
IEEE
143views Communications» more  FGCN 2008»
14 years 3 months ago
The Study of Location Strategy for Bank
In this paper, authors attempt to shed light on the factors that influence the locations of bank branches in establishing a bank’s branch network from the angle of the network a...
Jae Weon Hong, Won Eui Hong, Yoon-Sik Kwak
APPROX
2004
Springer
135views Algorithms» more  APPROX 2004»
14 years 2 months ago
The Diameter of Randomly Perturbed Digraphs and Some Applications.
The central observation of this paper is that if ǫn random arcs are added to any n-node strongly connected digraph with bounded degree then the resulting graph has diameter O(ln ...
Abraham Flaxman, Alan M. Frieze