Sciweavers

83 search results - page 12 / 17
» Limiting path exploration in BGP
Sort
View
ICS
2009
Tsinghua U.
15 years 4 months ago
Cancellation of loads that return zero using zero-value caches
The speed gap between processor and memory continues to limit performance. To address this problem, we explore the potential of eliminating Zero Loads—loads accessing memory loc...
Md. Mafijul Islam, Sally A. McKee, Per Stenstr&oum...
ICRA
2009
IEEE
182views Robotics» more  ICRA 2009»
15 years 4 months ago
Manipulation planning on constraint manifolds
Abstract— We present the Constrained Bi-directional RapidlyExploring Random Tree (CBiRRT) algorithm for planning paths in configuration spaces with multiple constraints. This al...
Dmitry Berenson, Siddhartha S. Srinivasa, Dave Fer...
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 2 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
CEC
2008
IEEE
15 years 3 months ago
DEACO: Hybrid Ant Colony Optimization with Differential Evolution
—Ant Colony Optimization (ACO) algorithm is a novel meta-heuristic algorithm for the approximate solution of combinatorial optimization problems that has been inspired by the for...
Xiangyin Zhang, Haibin Duan, Jiqiang Jin
VTC
2007
IEEE
138views Communications» more  VTC 2007»
15 years 3 months ago
Applicability of UWB Double Directional Propagation Modeling for Evaluating UWB Transmission Performance
Abstract— This paper investigates the applicability of deterministic ultra wideband (UWB) propagation modeling for evaluating UWB system performances. The modeling explores the w...
Katsuyuki Haneda, Jun-ichi Takada, Takehiko Kobaya...