Search
Now showing items 541-550 of 648
Refactoring Sequential Java Code for Concurrency via Concurrent Libraries
(2008-09-30)
Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 packagejava.util.concurrent (j.u.c.) supports writing concurrent programs: much of the complexity of writing threads-safe and ...
The Case for a Factored Operating System (fos)
(2008-10-08)
The next decade will afford us computer chips with 1,000 - 10,000 cores on a single piece of silicon. Contemporary operating systems have been designed to operate on a single core or small number of cores and hence are not ...
Adaptive Kernel Methods Using the Balancing Principle
(2008-10-16)
The regularization parameter choice is a fundamental problem in supervised learning since the performance of most algorithms crucially depends on the choice of one or more of such parameters. In particular a main theoretical ...
One Video Stream to Serve Diverse Receivers
(2008-10-18)
The fundamental problem of wireless video multicast is to scalably serve multiple receivers which may have very different channel characteristics. Ideally, one would like to broadcast a single stream that allows each ...
Recursively invoking Linnaeus: A Taxonomy for Naming Systems
(2002-03-01)
Naming is a central element of a distributed or network system design. Appropriate design choices are central. This paper explores a taxonomy of naming systems, and engineering tradeoffs as an aid to the namespace designer. ...
Modular Generation and Customization
(2008-10-10)
Modularity and flexibility can conflict in multi-language systems. For example, the templates commonly used to generate web pages must be manually updated when the database schema changes. Modularity can be improved by ...
ZigZag Decoding: Combating Hidden Terminals In Wireless Networks
(2008-10-01)
This paper presents ZigZag, an 802.11 receiver design that combats hidden terminals. ZigZag's core contribution is a new form of interference cancellation that exploits asynchrony across successive collisions. Specifically, ...
Detecting Hazardous Intensive Care Patient Episodes Using Real-time Mortality Models
(2009-08-26)
The modern intensive care unit (ICU) has become a complex, expensive, data-intensive environment. Caregivers maintain an overall assessment of their patients based on important observations and trends. If an advanced ...
Extending a MOOS-IvP Autonomy System and Users Guide to the IvPBuild Toolbox
(2009-08-20)
This document describes how to extend the suite of MOOS applications and IvP Helm behaviors distributed with the MOOS-IvP software bundle from www.moos-ivp.org. It covers (a) a straw-man repository with a place-holder MOOS ...
Information Flow for Secure Distributed Applications
(2009-08-27)
Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...