Sciweavers

13841 search results - page 2631 / 2769
» Algorithms and Constraint Programming
Sort
View
JNSM
2008
104views more  JNSM 2008»
15 years 1 months ago
Call Forwarding-Based Active Probing for POTS Fault Isolation
To ensure high availability of telephone services, there is considerable interest in network management activities to develop competent fault management mechanisms. In this paper w...
Chi-Shih Chao, Maitreya Natu, Adarshpal S. Sethi
INFOCOM
2010
IEEE
15 years 1 months ago
Optimal Probing for Unicast Network Delay Tomography
—Network tomography has been proposed to ascertain internal network performances from end-to-end measurements. In this work, we present priority probing, an optimal probing schem...
Yu Gu, Guofei Jiang, Vishal Singh, Yueping Zhang
KBSE
2010
IEEE
15 years 1 months ago
An automated approach for finding variable-constant pairing bugs
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Julia L. Lawall, David Lo
MICAI
2010
Springer
15 years 1 months ago
Teaching a Robot to Perform Tasks with Voice Commands
The full deployment of service robots in daily activities will require the robot to adapt to the needs of non-expert users, particularly, to learn how to perform new tasks from “...
Ana C. Tenorio-Gonzalez, Eduardo F. Morales, Luis ...
NETWORKS
2010
15 years 1 months ago
Complexity of some inverse shortest path lengths problems
The input to an Inverse Shortest Path Lengths Problem (ISPL) consists of a graph G with arc weights, and a collection of source-sink pairs with prescribed distances that do not ne...
Tingting Cui, Dorit S. Hochbaum
« Prev « First page 2631 / 2769 Last » Next »