Sciweavers

107 search results - page 15 / 22
» Dependable Polygon-Processing Algorithms for Safety-Critical...
Sort
View
IJPP
2008
74views more  IJPP 2008»
15 years 1 months ago
Bandwidth Efficient All-to-All Broadcast on Switched Clusters
We develop an all-to-all broadcast scheme that achieves maximum bandwidth efficiency for clusters with tree topologies. Using our scheme for clusters with cut-through switches, an...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan
93
Voted
ICRA
2003
IEEE
94views Robotics» more  ICRA 2003»
15 years 6 months ago
Enveloping obstacles with hexagonal metamorphic robots
Abstract— The problem addressed is the distributed reconfiguration of a metamorphic robot system composed of any number of two dimensional robots (modules). The initial configu...
Jennifer E. Walter, Elizabeth M. Tsai, Nancy M. Am...
DAC
2003
ACM
16 years 2 months ago
Scalable modeling and optimization of mode transitions based on decoupled power management architecture
To save energy, many power management policies rely on issuing mode-change commands to the components of the system. Efforts to date have focused on how these policies interact wi...
Dexin Li, Qiang Xie, Pai H. Chou
RTCSA
2000
IEEE
15 years 5 months ago
Task attribute assignment of fixed priority scheduled tasks to reenact off-line schedules
A number of industrial applications advocate the use of time-triggered approaches for reasons of predictability, distribution, and particular constraints such as jitter or end-to-...
Radu Dobrin, Yusuf Özdemir, Gerhard Fohler
114
Voted
DRM
2003
Springer
15 years 6 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia