Sciweavers

162 search results - page 18 / 33
» Symbolic Performance and Dependability Evaluation with the T...
Sort
View
HPDC
1996
IEEE
13 years 11 months ago
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
One purpose of the MBone is to study the performance of multicast and real-time protocols in global conferencing applications. Part of this evaluation is dependent on understandin...
Kevin C. Almeroth, Mostafa H. Ammar
CISS
2008
IEEE
14 years 1 months ago
Near optimal lossy source coding and compression-based denoising via Markov chain Monte Carlo
— We propose an implementable new universal lossy source coding algorithm. The new algorithm utilizes two wellknown tools from statistical physics and computer science: Gibbs sam...
Shirin Jalali, Tsachy Weissman
PLDI
2009
ACM
14 years 2 months ago
Analyzing recursive programs using a fixed-point calculus
We show that recursive programs where variables range over finite domains can be effectively and efficiently analyzed by describing the analysis algorithm using a formula in a ...
Salvatore La Torre, Parthasarathy Madhusudan, Genn...
HICSS
2010
IEEE
203views Biometrics» more  HICSS 2010»
14 years 2 months ago
Secure Planning of Order Picking Systems with the Aid of Simulation
Planning a new logistics center is a quite difficult job. Depending on the requirements there are a great number of possible design versions. The planner has to consider not only ...
Alexander Ulbrich, Stefan Galka, Willibald A. G&uu...
INFOCOM
2008
IEEE
14 years 1 months ago
Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak Signal
—It is well known that a packet loss in 802.11 can happen either due to collision or an insufficiently strong signal. However, discerning the exact cause of a packet loss, once ...
Shravan K. Rayanchu, Arunesh Mishra, Dheeraj Agraw...