Sciweavers

9842 search results - page 1874 / 1969
» The Complexity of the Matching-Cut Problem
Sort
View
142
Voted
MOBIHOC
2002
ACM
16 years 3 months ago
Path set selection in mobile ad hoc networks
Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on the network ability to support QoS...
Emin Gün Sirer, Panagiotis Papadimitratos, Zy...
146
Voted
POPL
2010
ACM
16 years 28 days ago
Pure Subtype Systems
This paper introduces a new approach to type theory called pure subtype systems. Pure subtype systems differ from traditional approaches to type theory (such as pure type systems)...
DeLesley S. Hutchins
133
Voted
ICCAD
2002
IEEE
124views Hardware» more  ICCAD 2002»
16 years 13 days ago
Symbolic pointer analysis
— One of the bottlenecks in the recent movement of hardware synthesis from behavioral C programs is the difficulty in reasoning about runtime pointer values at compile time. The...
Jianwen Zhu
130
Voted
SOSP
2009
ACM
16 years 13 days ago
Fast byte-granularity software fault isolation
Bugs in kernel extensions remain one of the main causes of poor operating system reliability despite proposed techniques that isolate extensions in separate protection domains to ...
Miguel Castro, Manuel Costa, Jean-Philippe Martin,...
153
Voted
IUI
2009
ACM
16 years 13 days ago
What were you thinking?: filling in missing dataflow through inference in learning from demonstration
Recent years have seen a resurgence of interest in programming by demonstration. As end users have become increasingly sophisticated, computer and artificial intelligence technolo...
Melinda T. Gervasio, Janet L. Murdock
« Prev « First page 1874 / 1969 Last » Next »