Sciweavers

1816 search results - page 165 / 364
» Trace oblivious computation
Sort
View
AAAI
1992
13 years 11 months ago
Analyzing Failure Recovery to Improve Planner Design
Plans fail for many reasons. During planner development, failure can often be traced to actions of the planner itself. Failure recovery analysis is a procedure for analyzing execu...
Adele E. Howe
SIGMETRICS
2008
ACM
13 years 10 months ago
Managing inter-domain traffic in the presence of bittorrent file-sharing
Overlay routing operating in a selfish manner is known to cause undesired instability when it interacts with native layer routing. We observe similar selfish behavior with the Bit...
Srinivasan Seetharaman, Mostafa H. Ammar
INFOCOM
2010
IEEE
13 years 8 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
ISOLA
2010
Springer
13 years 8 months ago
Context-Sensitivity in IPET for Measurement-Based Timing Analysis
Abstract. The Implicit Path Enumeration Technique (IPET) has become widely accepted as a powerful technique to compute upper bounds on the Worst-Case Execution Time (WCET) of time-...
Michael Zolda, Sven Bünte, Raimund Kirner
MICCAI
2010
Springer
13 years 8 months ago
Automated Sulci Identification via Intrinsic Modeling of Cortical Anatomy
In this paper we propose a novel and robust system for the automated identification of major sulci on cortical surfaces. Using multiscale representation and intrinsic surface mappi...
Yonggang Shi, Bo Sun, Rongjie Lai, Ivo D. Dinov, A...