Sciweavers

1845 search results - page 159 / 369
» Computing the Angularity Tolerance
Sort
View
SPAA
2010
ACM
15 years 8 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
106
Voted
DSN
2006
IEEE
15 years 9 months ago
Automatic Instruction-Level Software-Only Recovery
As chip densities and clock rates increase, processors are becoming more susceptible to transient faults that can affect program correctness. Computer architects have typically ad...
Jonathan Chang, George A. Reis, David I. August
SMA
2010
ACM
231views Solid Modeling» more  SMA 2010»
15 years 4 months ago
Conservative swept volume boundary approximation
We present a novel technique for approximating the boundary of a swept volume. The generator given by an input triangle mesh is rendered under all rigid transformations of a discr...
Andreas von Dziegielewski, R. Erbes, Elmar Sch&oum...
CHI
2003
ACM
16 years 4 months ago
Containers: a new hierarchical model for browser interfaces
The development of a low bandwidth, high error tolerant neural browser, called the BrainBrowser, has raised new navigational issues. With this paradigm shift of twodimensional spa...
Chad Owens
NCA
2008
IEEE
15 years 10 months ago
Failure, Disconnection and Partition Detection in Mobile Environment
In mobile environment, nodes can move around and voluntarily leave or join the network. Furthermore, they can crash or be disconnected from the network due to the absence of netwo...
Denis Conan, Pierre Sens, Luciana Arantes, Mathieu...