Sciweavers

1015 search results - page 156 / 203
» The data locality of work stealing
Sort
View
WIDM
2003
ACM
14 years 1 months ago
XPath query transformation based on XSLT stylesheets
Whenever XML data must be shared by heterogeneous applications, transformations between different applicationspecific XML formats are necessary. The state-of-the-art method transf...
Sven Groppe, Stefan Böttcher
ICPADS
2002
IEEE
14 years 1 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
ICRA
1999
IEEE
89views Robotics» more  ICRA 1999»
14 years 1 months ago
Failure Tolerant Teleoperation of a Kinematically Redundant Manipulator: An Experimental Study
Teleoperated robots in harsh environments have a significant likelihood of failures. It has been shown in previous work that a common type of failure such as that of a joint "...
Manish Goel, Anthony A. Maciejewski, Venkataramana...
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
14 years 18 days ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
CAV
2006
Springer
116views Hardware» more  CAV 2006»
14 years 13 days ago
Lazy Shape Analysis
Abstract. Many software model checkers are based on predicate abstraction. If the verification goal depends on pointer structures, the approach does not work well, because it is di...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...