Sciweavers

1579 search results - page 252 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
MSR
2005
ACM
15 years 3 months ago
Mining version histories to verify the learning process of Legitimate Peripheral Participants
Since code revisions reflect the extent of human involvement in the software development process, revision histories reveal the interactions and interfaces between developers and...
Shih-Kun Huang, Kang-min Liu
PPOPP
2005
ACM
15 years 3 months ago
A linear-time algorithm for optimal barrier placement
We want to perform compile-time analysis of an SPMD program and place barriers in it to synchronize it correctly, minimizing the runtime cost of the synchronization. This is the b...
Alain Darte, Robert Schreiber
PPOPP
2005
ACM
15 years 3 months ago
Trust but verify: monitoring remotely executing programs for progress and correctness
The increased popularity of grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the use of tho...
Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P....
SAC
2005
ACM
15 years 3 months ago
Selective method combination in mixin-based composition
A mixin is a reusable module that provides uniform extend modifications to classes. It is an abstract subclass that is composable with a variety of superclasses. In mixinbased co...
Tetsuo Kamina, Tetsuo Tamai
WOWMOM
2005
ACM
195views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Exploiting MAC Flexibility in WiMAX for Media Streaming
The IEEE 802.16 standard (commonly known as WiMAX) which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. However, providing p...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly...