Sciweavers

1736 search results - page 280 / 348
» The rank-width of Directed Graphs
Sort
View
IEEEPACT
2008
IEEE
15 years 10 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
INFOCOM
2008
IEEE
15 years 10 months ago
Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints
—A fundamental problem in wireless networks is to estimate its throughput capacity - given a set of wireless nodes, and a set of connections, what is the maximum rate at which da...
Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marat...
121
Voted
MMSP
2008
IEEE
119views Multimedia» more  MMSP 2008»
15 years 10 months ago
Network image coding for multicast
—We consider a new problem in network image coding for multicast. In a multihop mesh network, structured as a directed graph, all nodes decode and display reconstructions of the ...
David P. Varodayan, David M. Chen, Bernd Girod
143
Voted
VL
2008
IEEE
133views Visual Languages» more  VL 2008»
15 years 10 months ago
Analyzing a socio-technical visualization tool using usability inspection methods
Ariadne is a novel visualization tool that allows end users to explore the socio-technical relationships in software development projects. Essentially the visualization is a varia...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
134
Voted
ACSAC
2007
IEEE
15 years 10 months ago
A Taxonomy of Botnet Structures
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (e.g., spam, ddos). Usi...
David Dagon, Guofei Gu, Christopher P. Lee, Wenke ...