Sciweavers

1036 search results - page 161 / 208
» The case for a location metasystem
Sort
View
IPPS
1997
IEEE
13 years 12 months ago
Time-Stamping Algorithms for Parallelization of Loops at Run-Time
In this paper, we present two new run-time algorithms for the parallelization of loops that have indirect access patterns. The algorithms can handle any type of loop-carried depen...
Cheng-Zhong Xu, Vipin Chaudhary
WADS
1997
Springer
88views Algorithms» more  WADS 1997»
13 years 12 months ago
Finding Cores of Limited Length
In this paper we consider the problem of nding a core of limited length in a tree. A core is a path, which minimizes the sum of the distances to all nodes in the tree. This proble...
Stephen Alstrup, Peter W. Lauridsen, Peer Sommerlu...
DSN
2007
IEEE
13 years 11 months ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...
SUTC
2010
IEEE
13 years 11 months ago
Link Scheduling in a Single Broadcast Domain Underwater Networks
Because radio waves decay rapidly in sea water, acoustic communication is the most popular choic for underwater sensor networks. However, since the propagation speed of acoustic w...
Pai-Han Huang, Ying Chen, Bhaskar Krishnamachari, ...
HRI
2007
ACM
13 years 11 months ago
Interactive robot task training through dialog and demonstration
Effective human/robot interfaces which mimic how humans interact with one another could ultimately lead to robots being accepted in a wider domain of applications. We present a fr...
Paul E. Rybski, Kevin Yoon, Jeremy Stolarz, Manuel...