Sciweavers

2356 search results - page 431 / 472
» Characterizations of postman sets
Sort
View
144
Voted
ICS
2004
Tsinghua U.
15 years 7 months ago
EXPERT: expedited simulation exploiting program behavior repetition
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
Wei Liu, Michael C. Huang
LCTRTS
2004
Springer
15 years 7 months ago
Finding effective compilation sequences
Most modern compilers operate by applying a fixed, program-independent sequence of optimizations to all programs. Compiler writers choose a single “compilation sequence”, or ...
L. Almagor, Keith D. Cooper, Alexander Grosul, Tim...
DISCEX
2003
IEEE
15 years 7 months ago
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. T...
Roshan K. Thomas, Brian L. Mark, Tommy Johnson, Ja...
ICMENS
2003
IEEE
153views Hardware» more  ICMENS 2003»
15 years 7 months ago
Biologically Inspired Intelligent Robots Using Artificial Muscles
Humans throughout history have always sought to mimic the appearance, mobility, functionality, intelligent operation, and thinking process of biological creatures. This field of b...
Yoseph Bar-Cohen
130
Voted
ICRA
2003
IEEE
148views Robotics» more  ICRA 2003»
15 years 7 months ago
Needle insertion and radioactive seed implantation in human tissues: simulation and sensitivity analysis
− To facilitate training and planning for medical procedures such as prostate brachytherapy, we are developing an interactive simulation of needle insertion and radioactive seed ...
Ron Alterovitz, Kenneth Y. Goldberg, Jean Pouliot,...