Sciweavers

2996 search results - page 102 / 600
» Numberings and Randomness
Sort
View
78
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Power-Adjusted Random Access to a Wireless Channel
—The operation of widely-deployed random access to wireless networks is based on limited information on the result of each access attempt. When making a random access attempt, us...
Young-June Choi, Kang G. Shin
ISCA
2012
IEEE
280views Hardware» more  ISCA 2012»
13 years 3 months ago
A case for random shortcut topologies for HPC interconnects
—As the scales of parallel applications and platforms increase the negative impact of communication latencies on performance becomes large. Fortunately, modern High Performance C...
Michihiro Koibuchi, Hiroki Matsutani, Hideharu Ama...
106
Voted
ICRA
2003
IEEE
159views Robotics» more  ICRA 2003»
15 years 6 months ago
Randomized manipulation planning for a multi-fingered hand by switching contact modes
Abstract— This paper presents a randomized manipulation planner for a multi-fingered hand by switching contact modes. Manipulation planning for such a system should consider cha...
Masahito Yashima, Yoshikazu Shiina, Hideya Yamaguc...
82
Voted
ICASSP
2008
IEEE
15 years 7 months ago
A compressive beamforming method
Compressive Sensing (CS) is an emerging area which uses a relatively small number of non-traditional samples in the form of randomized projections to reconstruct sparse or compres...
Ali Cafer Gurbuz, James H. McClellan, Volkan Cevhe...
VMCAI
2009
Springer
15 years 7 months ago
Finding Concurrency-Related Bugs Using Random Isolation
This paper describes the methods used in Empire, a tool to detect concurrency-related bugs, namely atomic-set serializability violations in Java programs. The correctness criterion...
Nicholas Kidd, Thomas W. Reps, Julian Dolby, Manda...