Sciweavers

2084 search results - page 396 / 417
» Proving Time Bounds for Randomized Distributed Algorithms
Sort
View
88
Voted
PPOPP
2010
ACM
15 years 7 months ago
Leveraging parallel nesting in transactional memory
Exploiting the emerging reality of affordable multi-core architeces through providing programmers with simple abstractions that would enable them to easily turn their sequential p...
João Barreto, Aleksandar Dragojevic, Paulo ...
ISPD
2000
ACM
139views Hardware» more  ISPD 2000»
15 years 2 months ago
Critical area computation for missing material defects in VLSI circuits
We address the problem of computing critical area for missing material defects in a circuit layout. The extraction of critical area is the main computational problem in VLSI yield...
Evanthia Papadopoulou
SUTC
2010
IEEE
15 years 1 months ago
A Log-Ratio Information Measure for Stochastic Sensor Management
—In distributed sensor networks, computational and energy resources are in general limited. Therefore, an intelligent selection of sensors for measurements is of great importance...
Daniel Lyons, Benjamin Noack, Uwe D. Hanebeck
CORR
2006
Springer
160views Education» more  CORR 2006»
14 years 9 months ago
On Conditional Branches in Optimal Search Trees
A commonly used type of search tree is the alphabetic binary tree, which uses (without loss of generality) "less than" versus "greater than or equal to" tests ...
Michael B. Baer
ESWA
2006
123views more  ESWA 2006»
14 years 9 months ago
Design of a RFID case-based resource management system for warehouse operations
In the past, the selection of resources to execute various warehouse operation services was done solely by experts. In this paper, a RFIDbased Resource Management System (RFID-RMS...
Harry K. H. Chow, King Lun Choy, W. B. Lee, K. C. ...