Sciweavers

8795 search results - page 1627 / 1759
» Measuring Generality of Documents
Sort
View
IMC
2006
ACM
15 years 5 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
IMC
2006
ACM
15 years 5 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
ISLPED
2006
ACM
128views Hardware» more  ISLPED 2006»
15 years 5 months ago
Design and power management of energy harvesting embedded systems
Harvesting energy from the environment is a desirable and increasingly important capability in several emerging applications of embedded systems such as sensor networks, biomedica...
Vijay Raghunathan, Pai H. Chou
ISPD
2006
ACM
158views Hardware» more  ISPD 2006»
15 years 5 months ago
Effective linear programming based placement methods
Linear programming (LP) based methods are attractive for solving the placement problem because of their ability to model Half-Perimeter Wirelength (HPWL) and timing. However, it h...
Sherief Reda, Amit Chowdhary
ISSTA
2006
ACM
15 years 5 months ago
Test input generation for java containers using state matching
The popularity of object-oriented programming has led to the wide use of container libraries. It is important for the reliability of these containers that they are tested adequate...
Willem Visser, Corina S. Pasareanu, Radek Pel&aacu...
« Prev « First page 1627 / 1759 Last » Next »