Sciweavers

2838 search results - page 336 / 568
» Verifying Controlled Components
Sort
View
103
Voted
HPCA
2007
IEEE
15 years 7 months ago
Error Detection via Online Checking of Cache Coherence with Token Coherence Signatures
To provide high dependability in a multithreaded system despite hardware faults, the system must detect and correct errors in its shared memory system. Recent research has explore...
Albert Meixner, Daniel J. Sorin
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 7 months ago
Properties of the Traffic Output by a Leaky-Bucket Policer with Long-Range Dependent Input Traffic
 Long-range dependence (LRD) is a largely verified property of Internet traffic, which severely affects queuing performance in network buffers. A common approach for guaranteein...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
85
Voted
ICDM
2007
IEEE
109views Data Mining» more  ICDM 2007»
15 years 7 months ago
A Support Vector Approach to Censored Targets
Censored targets, such as the time to events in survival analysis, can generally be represented by intervals on the real line. In this paper, we propose a novel support vector tec...
Pannagadatta K. Shivaswamy, Wei Chu, Martin Jansch...
87
Voted
ICNP
2007
IEEE
15 years 7 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
111
Voted
ICRA
2007
IEEE
139views Robotics» more  ICRA 2007»
15 years 7 months ago
Multi-Robot Formations based on the Queue-Formation Scheme with Limited Communications
— In this paper, we investigate the operation of the Queue-formation structure (or Q-structure) in multi-robot teams with limited communications. Information flow is divided int...
Cheng-Heng Fua, Shuzhi Sam Ge, Khac Duc Do, Khiang...