Sciweavers

19003 search results - page 35 / 3801
» We Need Assurance!
Sort
View
HT
1997
ACM
13 years 12 months ago
As We Should Have Thought
The hypermedia field has long realized the need for firstructural abstractions. However, we have failed to generalize the concept of ubiquitous structure management to problem dom...
Peter J. Nürnberg, John J. Leggett, Erich R. ...
CAV
1998
Springer
103views Hardware» more  CAV 1998»
13 years 12 months ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...
SIGMETRICS
2011
ACM
178views Hardware» more  SIGMETRICS 2011»
13 years 2 months ago
Should we worry about memory loss?
In recent years the High Performance Computing (HPC) industry has benefited from the development of higher density multi-core processors. With recent chips capable of executing u...
O. Perks, Simon D. Hammond, S. J. Pennycook, Steph...
EDBT
2008
ACM
160views Database» more  EDBT 2008»
14 years 7 months ago
Why go logarithmic if we can go linear?: Towards effective distinct counting of search traffic
Estimating the number of distinct elements in a large multiset has several applications, and hence has attracted active research in the past two decades. Several sampling and sket...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
PAM
2010
Springer
14 years 2 months ago
Yes, We LEDBAT: Playing with the New BitTorrent Congestion Control Algorithm
Since December 2008, the official BitTorrent client is using a new congestion-control protocol for data transfer, implemented at the application layer and built over UDP at the tr...
Dario Rossi, Claudio Testa, Silvio Valenti