Sciweavers

276 search results - page 33 / 56
» State dependence in performance evaluation of component-base...
Sort
View
ICRA
2007
IEEE
157views Robotics» more  ICRA 2007»
14 years 1 months ago
Distributed Watchpoints: Debugging Large Multi-Robot Systems
Abstract— Tightly-coupled multi-agent systems such as modular robots frequently exhibit properties of interest that span multiple modules. These properties cannot easily be detec...
Michael DeRosa, Jason Campbell, Padmanabhan Pillai...
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
13 years 11 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
ICSE
2007
IEEE-ACM
14 years 7 months ago
OPIUM: Optimal Package Install/Uninstall Manager
Linux distributions often include package management tools such as apt-get in Debian or yum in RedHat. Using information about package dependencies and conflicts, such tools can d...
Chris Tucker, David Shuffelton, Ranjit Jhala, Sori...
EUROSYS
2009
ACM
14 years 2 months ago
SnowFlock: rapid virtual machine cloning for cloud computing
Virtual Machine (VM) fork is a new cloud computing abstraction that instantaneously clones a VM into multiple replicas running on different hosts. All replicas share the same init...
Horacio Andrés Lagar-Cavilla, Joseph Andrew...
IPPS
2009
IEEE
14 years 2 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...