Sciweavers

8771 search results - page 1640 / 1755
» Different by design
Sort
View
159
Voted
PLDI
2005
ACM
15 years 7 months ago
Scalable statistical bug isolation
We present a statistical debugging algorithm that isolates bugs in programs containing multiple undiagnosed bugs. Earlier statistical algorithms that focus solely on identifying p...
Ben Liblit, Mayur Naik, Alice X. Zheng, Alexander ...
106
Voted
SENSYS
2005
ACM
15 years 7 months ago
TSAR: a two tier sensor storage architecture using interval skip graphs
Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems a...
Peter Desnoyers, Deepak Ganesan, Prashant J. Sheno...
SIGCOMM
2005
ACM
15 years 7 months ago
Implications of autonomy for the expressiveness of policy routing
Thousands of competing autonomous systems must cooperate with each other to provide global Internet connectivity. Each autonomous system (AS) encodes various economic, business, a...
Nick Feamster, Ramesh Johari, Hari Balakrishnan
SIGCOMM
2005
ACM
15 years 7 months ago
Limitations of equation-based congestion control
We study limitations of an equation-based congestion control protocol, called TFRC (TCP Friendly Rate Control). It examines how the three main factors that determine TFRC throughp...
Injong Rhee, Lisong Xu
SIGECOM
2005
ACM
169views ECommerce» more  SIGECOM 2005»
15 years 7 months ago
Online auctions with re-usable goods
This paper concerns the design of mechanisms for online scheduling in which agents bid for access to a re-usable resource such as processor time or wireless network access. Each a...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Mo...
« Prev « First page 1640 / 1755 Last » Next »