• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,577
Next 10 →

Points-to Analysis in Almost Linear Time

by Bjarne Steensgaard , 1996
"... We present an interprocedural flow-insensitive points-to analysis based on type inference methods with an almost linear time cost complexity. To our knowledge, this is the asymptotically fastest non-trivial interprocedural points-to analysis algorithm yet described. The algorithm is based on a non-s ..."
Abstract - Cited by 595 (3 self) - Add to MetaCart
We present an interprocedural flow-insensitive points-to analysis based on type inference methods with an almost linear time cost complexity. To our knowledge, this is the asymptotically fastest non-trivial interprocedural points-to analysis algorithm yet described. The algorithm is based on a non

Fading relay channels: Performance limits and space-time signal design

by Rohit U. Nabar, Helmut Bölcskei, Felix W. Kneubühler - IEEE J. SELECT. AREAS COMMUN , 2004
"... Cooperative diversity is a transmission technique where multiple terminals pool their resources to form a virtual antenna array that realizes spatial diversity gain in a distributed fashion. In this paper, we examine the basic building block of cooperative diversity systems, a simple fading relay ch ..."
Abstract - Cited by 445 (4 self) - Add to MetaCart
of the paper is devoted to (distributed) space-time code design for fading relay channels operating in the AF mode. We show that the corresponding code design criteria consist of the traditional rank and determinant criteria for the case of co-located antennas as well as appropriate power control rules

Networks in the modern economy: Mexican migrants in the u.s. labor market

by Kaivan Munshi - Quarterly Journal of Economics , 2003
"... This paper attempts to identify job networks among Mexican migrants in the U. S. labor market. The empirical analysis uses data on migration patterns and labor market outcomes, based on a sample of individuals belonging to multiple origin-communities in Mexico, over a long period of time. Each commu ..."
Abstract - Cited by 353 (5 self) - Add to MetaCart
community’s network is measured by the proportion of the sampled individuals who are located at the destination (the United States) in any year. We verify that the same individual is more likely to be employed and to hold a higher paying nonagricultural job when his network is exogenously larger

Locating causes of program failures

by Holger Cleve, Andreas Zeller - 27th International Conference on Software Engineering (ICSE , 2005
"... Which is the defect that causes a software failure? By comparing the program states of a failing and a passing run, we can identify the state differences that cause the failure. However, these state differences can occur all over the program run. Therefore, we focus in space on those variables and v ..."
Abstract - Cited by 235 (9 self) - Add to MetaCart
and values that are relevant for the failure, and in time on those moments where cause transitions occur—moments where new relevant variables begin being failure causes: “Initially, variable argc was 3; therefore, at shell sort(), variable a[2] was 0, and therefore, the program failed. ” In our evaluation

Synthesizing Realistic Facial Expressions from Photographs

by Frédéric Pighin, Jamie Hecker, Dani Lischinski, Richard Szeliski, David H. Salesin
"... We present new techniques for creating photorealistic textured 3D facial models from photographs of a human subject, and for creating smooth transitions between different facial expressions by morphing between these different models. Starting from several uncalibrated views of a human subject, we em ..."
Abstract - Cited by 291 (11 self) - Add to MetaCart
We present new techniques for creating photorealistic textured 3D facial models from photographs of a human subject, and for creating smooth transitions between different facial expressions by morphing between these different models. Starting from several uncalibrated views of a human subject, we

Predestination: Inferring Destinations from Partial Trajectories

by John Krumm, Eric Horvitz - In Ubicomp , 2006
"... Abstract. We describe a method called Predestination that uses a history of a driver’s destinations, along with data about driving behaviors, to predict where a driver is going as a trip progresses. Driving behaviors include types of destinations, driving efficiency, and trip times. Beyond consideri ..."
Abstract - Cited by 140 (14 self) - Add to MetaCart
considering previously visited destinations, Predestination leverages an open-world modeling methodology that considers the likelihood of users visiting previously unobserved locations based on trends in the data and on the background properties of locations. This allows our algorithm to smoothly transition

A BGP-based Mechanism for Lowest-Cost Routing

by Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker , 2002
"... The routing of traffic between... this paper, we address the problem of interdomain routing from a mechanism-design point of view. The application of mechanism-design principles to the study of routing is the subject of earlier work by Nisan and Ronen [15] and Hershberger and Suri [11]. In this pape ..."
Abstract - Cited by 268 (16 self) - Add to MetaCart
mechanism computes lowest-cost routes for all source-destination pairs and payments for transit nodes on all of the routes (rather than computing routes and payments for only one source-destination pair at a time, as is done in [15,11]); (3) we show how to compute our mechanism with a distributed algorithm

Closing the gap in the capacity of wireless networks via percolation theory

by Massimo Franceschetti, Olivier Dousse, David N. C. Tse, Patrick Thiran - IEEE TRANS. INFORMATION THEORY , 2007
"... An achievable bit rate per source–destination pair in a wireless network of � randomly located nodes is determined adopting the scaling limit approach of statistical physics. It is shown that randomly scattered nodes can achieve, with high probability, the same Ia � � transmission rate of arbitrari ..."
Abstract - Cited by 238 (8 self) - Add to MetaCart
An achievable bit rate per source–destination pair in a wireless network of � randomly located nodes is determined adopting the scaling limit approach of statistical physics. It is shown that randomly scattered nodes can achieve, with high probability, the same Ia � � transmission rate

Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms

by Young-bae Ko, Nitin Vaidya , 1998
"... This paper addresses the problem of geocasting in mobile ad hoc network (MANET) environments. Geocasting is a variant of the conventional multicasting problem. For multicasting, conventional protocols define a multicast group as a collection of hosts which register to a multicast group address. Howe ..."
Abstract - Cited by 179 (3 self) - Add to MetaCart
. However, for geocasting, the group consists of the set of all nodes within a specified geographical region. Hosts within the specified region at a given time form the geocast group at that time. We present two different algorithms for delivering packets to such a group, and present simulation results. 1

On Calibrating Measurements of Packet Transit Times

by Vern Paxson - In Proceedings of ACM SIGMETRICS , 1998
"... We discuss the problem of detecting errors in measurements of the total delay experienced by packets transmitted through a wide-area network. We assume that we have measurements of the transmission times of a group of packets sent from an originating host, A, and a corresponding set of measurements ..."
Abstract - Cited by 138 (6 self) - Add to MetaCart
of their arrival times at their destination host, B, recorded by two separate clocks. We also assume that we have a similar series of measurements of packets sent from B to A (as might occur when recording a TCP connection), but we do not assume that the clock at A is synchronized with the clock at B, nor
Next 10 →
Results 1 - 10 of 2,577
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University