Sciweavers

7080 search results - page 1164 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
123
Voted
ISMIR
2005
Springer
124views Music» more  ISMIR 2005»
15 years 9 months ago
Symbolic Representation of Musical Chords: A Proposed Syntax for Text Annotations
In this paper we propose a text represention for musical chord symbols that is simple and intuitive for musically trained individuals to write and understand, yet highly structure...
Christopher Harte, Mark B. Sandler, Samer A. Abdal...
ICRA
2003
IEEE
110views Robotics» more  ICRA 2003»
15 years 9 months ago
Template based control of hexapedal running
In this paper, we introduce a new hexapedal locomotion controller that simulation evidence suggests will be capable of driving our RHex robot at speeds exceeding five body length...
Uluc Saranli, Daniel E. Koditschek
135
Voted
IDEAS
2003
IEEE
112views Database» more  IDEAS 2003»
15 years 9 months ago
Persistent Applications via Automatic Recovery
Building highly available enterprise applications using web-oriented middleware is hard. Runtime implementations frequently do not address the problems of application state persis...
Roger S. Barga, David B. Lomet, Stelios Paparizos,...
IPPS
2003
IEEE
15 years 9 months ago
So Many States, So Little Time: Verifying Memory Coherence in the Cray X1
This paper investigates a complexity-effective technique for verifying a highly distributed directory-based cache coherence protocol. We develop a novel approach called “witnes...
Dennis Abts, Steve Scott, David J. Lilja
PODC
2003
ACM
15 years 9 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku
« Prev « First page 1164 / 1416 Last » Next »