Sciweavers

9989 search results - page 1928 / 1998
» A CLP Approach to Modelling Systems
Sort
View
RSA
2000
170views more  RSA 2000»
15 years 3 months ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski
GIS
2010
ACM
15 years 2 months ago
Decentralized querying of topological relations between regions without using localization
This paper proposes an efficient, decentralized algorithm for determining the topological relationship between two regions monitored by a geosensor network. Many centralized algo...
Matt Duckham, Myeong Hun Jeong, Sanjiang Li, Joche...
SIAMSC
2010
132views more  SIAMSC 2010»
15 years 2 months ago
A Posteriori Error Estimates Including Algebraic Error and Stopping Criteria for Iterative Solvers
For the finite volume discretization of a second-order elliptic model problem, we derive a posteriori error estimates which take into account an inexact solution of the associated...
Pavel Jiránek, Zdenek Strakos, Martin Vohra...
CASES
2010
ACM
15 years 2 months ago
Improved procedure placement for set associative caches
The performance of most embedded systems is critically dependent on the memory hierarchy performance. In particular, higher cache hit rate can provide significant performance boos...
Yun Liang, Tulika Mitra
CCS
2010
ACM
15 years 2 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
« Prev « First page 1928 / 1998 Last » Next »