Sciweavers

9842 search results - page 1704 / 1969
» Compositional timing analysis
Sort
View
147
Voted
IMC
2010
ACM
15 years 1 months ago
Flowroute: inferring forwarding table updates using passive flow-level measurements
The reconvergence of routing protocols in response to changes in network topology can impact application performance. While improvements in protocol specification and implementati...
Amogh Dhamdhere, Lee Breslau, Nick G. Duffield, Ch...
140
Voted
IMC
2010
ACM
15 years 1 months ago
Challenges in measuring online advertising systems
Online advertising supports many Internet services, such as search, email, and social networks. At the same time, there are widespread concerns about the privacy loss associated w...
Saikat Guha, Bin Cheng, Paul Francis
144
Voted
INLG
2010
Springer
15 years 1 months ago
Situated Reference in a Hybrid Human-Robot Interaction System
We present the situated reference generation module of a hybrid human-robot interaction system that collaborates with a human user in assembling target objects from a wooden toy c...
Manuel Giuliani, Mary Ellen Foster, Amy Isard, Col...
135
Voted
IPPS
2010
IEEE
15 years 1 months ago
Executing task graphs using work-stealing
Abstract--NABBIT is a work-stealing library for execution of task graphs with arbitrary dependencies which is implemented as a library for the multithreaded programming language Ci...
Kunal Agrawal, Charles E. Leiserson, Jim Sukha
129
Voted
PIMRC
2010
IEEE
15 years 1 months ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener
« Prev « First page 1704 / 1969 Last » Next »