Sciweavers

9284 search results - page 107 / 1857
» Knowledge State Algorithms
Sort
View
108
Voted
SIGSOFT
2003
ACM
16 years 3 months ago
Runtime safety analysis of multithreaded programs
Foundational and scalable techniques for runtime safety analysis of multithreaded programs are explored in this paper. A technique based on vector clocks to extract the causal dep...
Koushik Sen, Grigore Rosu, Gul Agha
95
Voted
NCA
2009
IEEE
15 years 9 months ago
Seed Scheduling for Peer-to-Peer Networks
—The initial phase in a content distribution (file sharing) scenario is delicate due to the lack of global knowledge and the dynamics of the overlay. An unwise distribution of t...
Flavio Esposito, Ibrahim Matta, Pietro Michiardi, ...
119
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Cross-Layer Design with Adaptive Modulation: Delay, Rate, and Energy Tradeoffs
— We present a crosslayer framework for optimizing the performance of wireless networks as measured by applications or upper layer protocols. The approach combines adaptive modul...
Daniel O'Neill, Andrea J. Goldsmith, Stephen P. Bo...
120
Voted
ICALP
2007
Springer
15 years 8 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
WACV
2005
IEEE
15 years 8 months ago
Incorporating Object Tracking Feedback into Background Maintenance Framework
Adaptive background modeling/subtraction techniques are popular, in particular, because they are able to cope with background variations that are due to lighting variations. Unfor...
Leonid Taycher, John W. Fisher III, Trevor Darrell