Search
Now showing items 111-120 of 290
Structuring Unreliable Radio Networks
(2011-12-22)
In this paper we study the problem of building a connected dominating set with constant degree (CCDS) in the dual graph radio network model. This model includes two types of links: reliable links, which
always deliver ...
Leader Election Using Loneliness Detection
(2011-10-12)
We consider the problem of leader election (LE) in single-hop radio networks with synchronized time slots for transmitting and receiving messages. We assume that the actual number n of processes is unknown, while the size ...
A Frequency Analysis of Monte-Carlo and other Numerical Integration Schemes
(2011-12-14)
The numerical calculation of integrals is central to many computer graphics algorithms such as Monte-Carlo Ray Tracing. We show that such methods can be studied using Fourier analysis. Numerical error is shown to correspond ...
Reasoning about Relaxed Programs
(2011-11-15)
A number of approximate program transformations have recently emerged that enable transformed programs to trade accuracy of their results for increased performance by dynamically and nondeterministically modifying variables ...
CPHash: A Cache-Partitioned Hash Table
(2011-11-26)
CPHash is a concurrent hash table for multicore processors. CPHash partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partition. CPHash's message passing avoids the ...
Jigsaw: Scalable Software-Defined Caches (Extended Version)
(2013-09-01)
Shared last-level caches, widely used in chip-multiprocessors (CMPs), face two fundamental limitations. First, the latency and energy of shared caches degrade as the system scales up. Second, when multiple workloads share ...
Does invariant recognition predict tuning of neurons in sensory cortex?
(2013-08-06)
Tuning properties of simple cells in cortical V1 can be described in terms of a "universal shape" characterized by parameter values which hold across different species. This puzzling set of findings begs for a general ...
Sound Input Filter Generation for Integer Overflow Errors
(2013-08-06)
We present a system, SIFT, for generating input filters that nullify integer overflow errors associated with critical program sites such as memory allocation or block copy sites. SIFT uses a static program analysis to ...
Harvesting Application Information for Industry-Scale Relational Schema Matching
(2013-09-10)
Consider the problem of migrating a company's CRM or ERP database from one application to another, or integrating two such databases as a result of a merger. This problem requires matching two large relational schemas with ...
Coded Emulation of Shared Atomic Memory for Message Passing Architectures
(2013-07-17)
This paper considers the communication and storage costs of emulating atomic (linearizable) read/write shared memory in distributed message-passing systems. We analyze the costs of previously-proposed algorithms by Attiya, ...