Sciweavers

614 search results - page 57 / 123
» A Distributed boundary detection algorithm for multi-robot s...
Sort
View
ECAI
2006
Springer
15 years 1 months ago
Reasoning with Inconsistencies in Propositional Peer-to-Peer Inference Systems
In a peer-to-peer inference system, there is no centralized control or hierarchical organization: each peer is equivalent in functionality and cooperates with other peers in order...
Philippe Chatalic, Gia Hien Nguyen, Marie-Christin...
68
Voted
IPPS
2006
IEEE
15 years 3 months ago
D1HT: a distributed one hop hash table
Distributed Hash Tables (DHTs) have been used in a variety of applications, but most DHTs so far have opted to solve lookups with multiple hops, which sacrifices performance in o...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
SPAA
2005
ACM
15 years 3 months ago
Efficient algorithms for verifying memory consistency
One approach in verifying the correctness of a multiprocessor system is to show that its execution results comply with the memory consistency model it is meant to implement. It ha...
Chaiyasit Manovit, Sudheendra Hangal
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 4 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
DAC
2005
ACM
15 years 10 months ago
MP core: algorithm and design techniques for efficient channel estimation in wireless applications
Channel estimation and multiuser detection are enabling technologies for future generations of wireless applications. However, sophisticated algorithms are required for accurate c...
Yan Meng, Andrew P. Brown, Ronald A. Iltis, Timoth...