Sciweavers

544 search results - page 14 / 109
» What cannot be computed locally!
Sort
View
IROS
2007
IEEE
137views Robotics» more  IROS 2007»
14 years 1 months ago
Energy-based 6-DOF penetration depth computation for penalty-based haptic rendering algorithms
Abstract— Existing penalty-based haptic rendering approaches compute penetration depth in strictly translational sense and cannot properly take object rotation into account. We a...
Maxim Kolesnikov, Milos Zefran
DFT
2009
IEEE
210views VLSI» more  DFT 2009»
13 years 10 months ago
Optimizing Parametric BIST Using Bio-inspired Computing Algorithms
Optimizing the BIST configuration based on the characteristics of the design under test is a complicated and challenging work for test engineers. Since this problem has multiple o...
Nastaran Nemati, Amirhossein Simjour, Amirali Ghof...
HOTOS
2009
IEEE
13 years 11 months ago
On Availability of Intermediate Data in Cloud Computations
This paper takes a renewed look at the problem of managing intermediate data that is generated during dataflow computations (e.g., MapReduce, Pig, Dryad, etc.) within clouds. We d...
Steven Y. Ko, Imranul Hoque, Brian Cho, Indranil G...
CAV
2010
Springer
161views Hardware» more  CAV 2010»
13 years 11 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
MOBICOM
2010
ACM
13 years 7 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...