Sciweavers

2060 search results - page 270 / 412
» Some Applications of Coding Theory in Computational Complexi...
Sort
View
ICLP
2009
Springer
16 years 5 months ago
A Language for Large Ensembles of Independently Executing Nodes
We address how to write programs for distributed computing systems in which the network topology can change dynamically. Examples of such systems, which we call ensembles, include ...
Michael P. Ashley-Rollman, Peter Lee, Seth Copen G...
DAC
2005
ACM
15 years 6 months ago
Smart diagnostics for configurable processor verification
This paper describes a novel technique called Embedded Test-bench Control (ETC), extensively used in the verification of Tensilica’s latest configurable processor. Conventional ...
Sadik Ezer, Scott Johnson
JSAC
2006
133views more  JSAC 2006»
15 years 4 months ago
Code-aided joint channel and frequency offset estimation for DS-CDMA
This paper deals with joint data detection, synchronization and channel parameter estimation for Direct-Sequence Code Division Multiple Access (DS-CDMA) systems over frequency sel...
Mamoun Guenach, Frederik Simoens, Henk Wymeersch, ...
HPDC
2008
IEEE
15 years 11 months ago
Issues in applying data mining to grid job failure detection and diagnosis
As grid computation systems become larger and more complex, manually diagnosing failures in jobs becomes impractical. Recently, machine-learning techniques have been proposed to d...
Lakshmikant Shrinivas, Jeffrey F. Naughton
PLDI
2009
ACM
15 years 11 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni