Sciweavers

5470 search results - page 294 / 1094
» Distributed Control Lab
Sort
View
TPDS
2008
80views more  TPDS 2008»
15 years 4 months ago
Scalable and Efficient End-to-End Network Topology Inference
To construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topolog...
Xing Jin, Wanqing Tu, S.-H. Gary Chan
CCR
2004
155views more  CCR 2004»
15 years 4 months ago
The dark side of the Web: an open proxy's view
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running services that interact with other resources on the Web. While such interaction c...
Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming ...
PPOPP
2012
ACM
13 years 12 months ago
A speculation-friendly binary search tree
We introduce the first binary search tree algorithm designed for speculative executions. Prior to this work, tree structures were mainly designed for their pessimistic (non-specu...
Tyler Crain, Vincent Gramoli, Michel Raynal
ICRA
2010
IEEE
147views Robotics» more  ICRA 2010»
15 years 2 months ago
Two-phased controller for a pair of 2-DOF soft fingertips based on the qualitative relationship between joint angles and object
— We have previously shown that hemispherical soft fingertips are at equilibrium when they are in contact with objects, suggesting that the contact force and flexibility of the...
Yujiro Yamazaki, Takahiro Inoue, Shinichi Hirai
CCS
2005
ACM
15 years 10 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone