Sciweavers

1008 search results - page 186 / 202
» Canonicity!
Sort
View
MSWIM
2005
ACM
15 years 3 months ago
Performance analysis of the intertwined effects between network layers for 802.11g transmissions
While the canonical behavior of today’s home Internet users involves several residents concurrently executing diverse Internet applications, the most common home configuration ...
Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant...
ISRR
2005
Springer
118views Robotics» more  ISRR 2005»
15 years 3 months ago
A Provably Consistent Method for Imposing Sparsity in Feature-Based SLAM Information Filters
An open problem in Simultaneous Localization and Mapping (SLAM) is the development of algorithms which scale with the size of the environment. A few promising methods exploit the ...
Matthew Walter, Ryan Eustice, John J. Leonard
92
Voted
PLDI
2004
ACM
15 years 3 months ago
Symbolic pointer analysis revisited
Pointer analysis is a critical problem in optimizing compiler, parallelizing compiler, software engineering and most recently, hardware synthesis. While recent efforts have sugges...
Jianwen Zhu, Silvian Calman
SIGMETRICS
2004
ACM
103views Hardware» more  SIGMETRICS 2004»
15 years 3 months ago
Myths and realities: the performance impact of garbage collection
This paper explores and quantifies garbage collection behavior for three whole heap collectors and generational counterparts: copying semi-space, mark-sweep, and reference counti...
Stephen M. Blackburn, Perry Cheng, Kathryn S. McKi...
73
Voted
CRYPTO
2004
Springer
111views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Signed Binary Representations Revisited
The most common method for computing exponentiation of random elements in Abelian groups are sliding window schemes, which enhance the efficiency of the binary method at the expens...
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Sp...