Sciweavers

5948 search results - page 930 / 1190
» Computing Robust Counter-Strategies
Sort
View
126
Voted
DSN
2003
IEEE
15 years 9 months ago
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet Services
Abstract: We present a new approach that uses compilerdirected fault-injection for coverage testing of recovery code in Internet services to evaluate their robustness to operating ...
Chen Fu, Richard P. Martin, Kiran Nagaraja, Thu D....
136
Voted
FOCS
2003
IEEE
15 years 9 months ago
Bounded Geometries, Fractals, and Low-Distortion Embeddings
The doubling constant of a metric space (X, d) is the smallest value λ such that every ball in X can be covered by λ balls of half the radius. The doubling dimension of X is the...
Anupam Gupta, Robert Krauthgamer, James R. Lee
154
Voted
ICCV
2003
IEEE
15 years 9 months ago
Eye Gaze Estimation from a Single Image of One Eye
In this paper, we present a novel approach, called the “one-circle” algorithm, for measuring the eye gaze using a monocular image that zooms in on only one eye of a person. Ob...
Jian-Gang Wang, Eric Sung, Ronda Venkateswarlu
ICPP
2003
IEEE
15 years 9 months ago
Scheduling Algorithms with Bus Bandwidth Considerations for SMPs
The bus that connects processors to memory is known to be a major architectural bottleneck in SMPs. However, both software and scheduling policies for these systems generally focu...
Christos D. Antonopoulos, Dimitrios S. Nikolopoulo...
IPPS
2003
IEEE
15 years 9 months ago
Dynamically Loaded Classes as Shared Libraries: An Approach to Improving Virtual Machine Scalability
Sharing selected data structures among virtual machines of a safe language can improve resource utilization of each participating run-time system. The challenge is to determine wh...
Bernard Wong, Grzegorz Czajkowski, Laurent Dayn&eg...