Sciweavers

2168 search results - page 156 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Bound analysis of closed queueing networks with workload burstiness
Burstiness and temporal dependence in service processes are often found in multi-tier architectures and storage devices and must be captured accurately in capacity planning models...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
EDBT
2004
ACM
174views Database» more  EDBT 2004»
16 years 4 months ago
Processing Data-Stream Join Aggregates Using Skimmed Sketches
There is a growing interest in on-line algorithms for analyzing and querying data streams, that examine each stream element only once and have at their disposal, only a limited amo...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...
RAS
2000
144views more  RAS 2000»
15 years 3 months ago
Robot navigation in the real world: : Experiments with Manchester's FortyTwo in unmodified, large environments
Mobile robot navigation under controlled laboratory conditions is, by now, state of the art and reliably achievable. To transfer navigation mechanisms used in such small-scale env...
Ulrich Nehmzow, Carl Owen
IROS
2007
IEEE
193views Robotics» more  IROS 2007»
15 years 10 months ago
Analyzing gaussian proposal distributions for mapping with rao-blackwellized particle filters
Abstract— Particle filters are a frequently used filtering technique in the robotics community. They have been successfully applied to problems such as localization, mapping, o...
Cyrill Stachniss, Giorgio Grisetti, Wolfram Burgar...
STOC
2009
ACM
171views Algorithms» more  STOC 2009»
16 years 4 months ago
On the geometry of graphs with a forbidden minor
We study the topological simplification of graphs via random embeddings, leading ultimately to a reduction of the Gupta-Newman-Rabinovich-Sinclair (GNRS) L1 embedding conjecture t...
James R. Lee, Anastasios Sidiropoulos