Sciweavers

107 search results - page 15 / 22
» Dependable Polygon-Processing Algorithms for Safety-Critical...
Sort
View
76
Voted
IJPP
2008
74views more  IJPP 2008»
14 years 11 months ago
Bandwidth Efficient All-to-All Broadcast on Switched Clusters
We develop an all-to-all broadcast scheme that achieves maximum bandwidth efficiency for clusters with tree topologies. Using our scheme for clusters with cut-through switches, an...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan
ICRA
2003
IEEE
94views Robotics» more  ICRA 2003»
15 years 5 months ago
Enveloping obstacles with hexagonal metamorphic robots
Abstract— The problem addressed is the distributed reconfiguration of a metamorphic robot system composed of any number of two dimensional robots (modules). The initial configu...
Jennifer E. Walter, Elizabeth M. Tsai, Nancy M. Am...
133
Voted
DAC
2003
ACM
16 years 19 days ago
Scalable modeling and optimization of mode transitions based on decoupled power management architecture
To save energy, many power management policies rely on issuing mode-change commands to the components of the system. Efforts to date have focused on how these policies interact wi...
Dexin Li, Qiang Xie, Pai H. Chou
RTCSA
2000
IEEE
15 years 4 months ago
Task attribute assignment of fixed priority scheduled tasks to reenact off-line schedules
A number of industrial applications advocate the use of time-triggered approaches for reasons of predictability, distribution, and particular constraints such as jitter or end-to-...
Radu Dobrin, Yusuf Özdemir, Gerhard Fohler
DRM
2003
Springer
15 years 4 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia