Sciweavers

1414 search results - page 211 / 283
» Cover Time and Broadcast Time
Sort
View
CAV
2009
Springer
116views Hardware» more  CAV 2009»
16 years 7 days ago
Meta-analysis for Atomicity Violations under Nested Locking
Abstract. We study the problem of determining, given a run of a concurrent program, whether there is any alternate execution of it that violates atomicity, where atomicity is defin...
Azadeh Farzan, P. Madhusudan, Francesco Sorrentino
58
Voted
CHI
2003
ACM
16 years 2 days ago
Human on-line response to target expansion
McGuffin and Balakrishnan (M&B) have recently reported evidence that target expansion during a reaching movement reduces pointing time even if the expansion occurs as late as ...
Michel Beaudouin-Lafon, Shumin Zhai, Stépha...
STOC
2004
ACM
126views Algorithms» more  STOC 2004»
16 years 7 hour ago
Bypassing the embedding: algorithms for low dimensional metrics
The doubling dimension of a metric is the smallest k such that any ball of radius 2r can be covered using 2k balls of raThis concept for abstract metrics has been proposed as a na...
Kunal Talwar
CIAC
2010
Springer
251views Algorithms» more  CIAC 2010»
15 years 9 months ago
A parameterized algorithm for Chordal Sandwich
Given an arbitrary graph G = (V, E) and an additional set of admissible edges F, the Chordal Sandwich problem asks whether there exists a chordal graph (V, E F ) such that F F. ...
Pinar Heggernes, Federico Mancini, Jesper Nederlof...
79
Voted
ICCD
2005
IEEE
119views Hardware» more  ICCD 2005»
15 years 8 months ago
Deployment of Better Than Worst-Case Design: Solutions and Needs
The advent of nanometer feature sizes in silicon fabrication has triggered a number of new design challenges for computer designers. These challenges include design complexity and...
Todd M. Austin, Valeria Bertacco