Sciweavers

1485 search results - page 116 / 297
» Whole Program Paths
Sort
View
CORR
2006
Springer
138views Education» more  CORR 2006»
13 years 9 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
PLDI
1998
ACM
14 years 1 months ago
The Implementation of the Cilk-5 Multithreaded Language
The fth release of the multithreaded language Cilk uses a provably good \work-stealing" scheduling algorithm similar to the rst system, but the language has been completely r...
Matteo Frigo, Charles E. Leiserson, Keith H. Randa...
COCOON
2007
Springer
14 years 3 months ago
Improved Throughput Bounds for Interference-Aware Routing in Wireless Networks
We propose new algorithms and improved bounds for interference-aware routing in wireless networks. First, we prove that n arbitrarily matched source-destinations pairs with average...
Chiranjeeb Buragohain, Subhash Suri, Csaba D. T&oa...
POPL
2005
ACM
14 years 9 months ago
Connecting effects and uniqueness with adoption
Abstract. In a previous paper, we discussed how the concepts of uniqueness and effects are interdependent. In this paper, we show how "Adoption and Focus," a proposal for...
John Tang Boyland, William Retert
INFOCOM
2008
IEEE
14 years 3 months ago
On Optimal Sizing of Tiered Network Services
Abstract— We develop an economic model for networks offering tiered services and we formulate the problem of selecting the service tiers from three perspectives: one that conside...
Qian Lv, George N. Rouskas