Sciweavers

4233 search results - page 32 / 847
» Three Paths to Effectiveness
Sort
View
PLDI
2005
ACM
15 years 5 months ago
Path slicing
We present a new technique, path slicing, that takes as input a possibly infeasible path to a target location, and eliminates all the operations that are irrelevant towards the re...
Ranjit Jhala, Rupak Majumdar
72
Voted
HT
2003
ACM
15 years 5 months ago
Browsing intricately interconnected paths
Graph-centric and node-centric browsing are the two commonly identified hypertext-browsing paradigms. We believe that pathcentric browsing, the browsing behavior exhibited by path...
Pratik Dave, Unmil Karadkar, Richard Furuta, Luis ...
ISCC
2002
IEEE
101views Communications» more  ISCC 2002»
15 years 4 months ago
Partial path protection for WDM networks: end-to-end recovery using local failure information
In this paper, we propose a new protection scheme, which we term partial path protection (PPP), to select endto-end backup paths using local information about network failures. PP...
Hungjen Wang, Eytan Modiano, Muriel Médard
ITC
2003
IEEE
120views Hardware» more  ITC 2003»
15 years 5 months ago
High Quality ATPG for Delay Defects
: The paper presents a novel technique for generating effective vectors for delay defects. The test set achieves high path delay fault coverage to capture smalldistributed delay de...
Puneet Gupta, Michael S. Hsiao
DSN
2004
IEEE
15 years 3 months ago
On Failure Dependent Protection in Optical Grooming Networks
Resiliency to link failures in optical networks is becoming increasingly important due to the increasing data rate in the fiber. Path protection schemes attempt to guarantee a bac...
Srinivasan Ramasubramanian