Sciweavers

14078 search results - page 2440 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
151
Voted
PRDC
2006
IEEE
15 years 10 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....
146
Voted
SUTC
2006
IEEE
15 years 10 months ago
DTTC: Delay-Tolerant Trajectory Compression for Object Tracking Sensor Networks
Taking advantage of the delay tolerance for objects tracking sensor networks, we propose delay-tolerant trajectory compression (DTTC) technique, an efficient and accurate algorit...
Yingqi Xu, Wang-Chien Lee
JCDL
2006
ACM
128views Education» more  JCDL 2006»
15 years 10 months ago
Building a research library for the history of the web
This paper describes the building of a research library for studying the Web, especially research on how the structure and content of the Web change over time. The library is part...
William Y. Arms, Selcuk Aya, Pavel Dmitriev, Blaze...
158
Voted
MOBICOM
2006
ACM
15 years 10 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
PPOPP
2006
ACM
15 years 10 months ago
Proving correctness of highly-concurrent linearisable objects
We study a family of implementations for linked lists using finegrain synchronisation. This approach enables greater concurrency, but correctness is a greater challenge than for ...
Viktor Vafeiadis, Maurice Herlihy, Tony Hoare, Mar...
« Prev « First page 2440 / 2816 Last » Next »