Sciweavers

3889 search results - page 702 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
FSTTCS
2009
Springer
15 years 10 months ago
Modelchecking counting properties of 1-safe nets with buffers in paraPSPACE
ABSTRACT. We consider concurrent systems that can be modelled as 1-safe Petri nets communicating through a fixed set of buffers (modelled as unbounded places). We identify a param...
M. Praveen, Kamal Lodaya
126
Voted
COMSWARE
2007
IEEE
15 years 9 months ago
Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks
—This paper deals with the topology formation schemes in the IEEE 802.11 based wireless mesh network. The recent standardization effort for specifying a wireless distribution sys...
Deepesh Man Shrestha, Young-Bae Ko
138
Voted
FSTTCS
2007
Springer
15 years 9 months ago
Better Algorithms and Bounds for Directed Maximum Leaf Problems
The Directed Maximum Leaf Out-Branching problem is to find an out-branching (i.e. a rooted oriented spanning tree) in a given digraph with the maximum number of leaves. In this pa...
Noga Alon, Fedor V. Fomin, Gregory Gutin, Michael ...
129
Voted
ACMMSP
2004
ACM
101views Hardware» more  ACMMSP 2004»
15 years 9 months ago
Metrics and models for reordering transformations
Irregular applications frequently exhibit poor performance on contemporary computer architectures, in large part because of their inefficient use of the memory hierarchy. Runtime ...
Michelle Mills Strout, Paul D. Hovland
119
Voted
CIKM
1999
Springer
15 years 7 months ago
Indexing and Retrieval of Scientific Literature
The web hasgreatly improved accessto scientific literature. However, scientific articles on the web are largely disorganized, with research articles being spreadacrossarchive site...
Steve Lawrence, Kurt D. Bollacker, C. Lee Giles