Sciweavers

7106 search results - page 1260 / 1422
» Restricted Complexity, General Complexity
Sort
View
143
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
Rateless Coding with Feedback
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...
INFOCOM
2009
IEEE
15 years 11 months ago
Multi-VPN Optimization for Scalable Routing via Relaying
—Enterprise networks are increasingly adopting Layer 3 Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) technology to connect geographically disparate locations...
MohammadHossein Bateni, Alexandre Gerber, Mohammad...
IPPS
2009
IEEE
15 years 11 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...
IROS
2009
IEEE
132views Robotics» more  IROS 2009»
15 years 11 months ago
Automatic selection of task spaces for imitation learning
Abstract— Previous work [1] shows that the movement representation in task spaces offers many advantages for learning object-related and goal-directed movement tasks through imit...
Manuel Mühlig, Michael Gienger, Jochen J. Ste...
ISCA
2009
IEEE
137views Hardware» more  ISCA 2009»
15 years 11 months ago
A case for an interleaving constrained shared-memory multi-processor
Shared-memory multi-threaded programming is inherently more difficult than single-threaded programming. The main source of complexity is that, the threads of an application can in...
Jie Yu, Satish Narayanasamy
« Prev « First page 1260 / 1422 Last » Next »