Results 1 - 10
of
9,576
This research was sponsored in part by the Advanced Research Projects Agency/CSTO monitored by SPAWAR under contract
, 1994
"... Performance measurement and monitoring tools are indispensable for research and application developments on a parallel system. To be effective, such tools must be accurate, nonintrusive, efficient, and easy to understand. Private-memory MIMD machines present special challenges, especially due to t ..."
Abstract
- Add to MetaCart
Performance measurement and monitoring tools are indispensable for research and application developments on a parallel system. To be effective, such tools must be accurate, nonintrusive, efficient, and easy to understand. Private-memory MIMD machines present special challenges, especially due
Sensor networks: Evolution, opportunities, and challenges
- PROCEEDINGS OF THE IEEE
, 2003
"... Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spann ..."
Abstract
-
Cited by 655 (1 self)
- Add to MetaCart
Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA
The Deisgn Philosophy of the DARPA Internet Protocols
- In ACM SIGCOMM
, 1988
"... The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work, it i ..."
Abstract
-
Cited by 551 (2 self)
- Add to MetaCart
The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work
Ontology Development 101: A Guide to Creating Your First Ontology
, 2001
"... In recent years the development of ontologies—explicit formal specifications of the terms in the domain and relations among them (Gruber 1993)—has been moving from the realm of Artificial-Intelligence laboratories to the desktops of domain experts. Ontologies have become common on the World-Wide Web ..."
Abstract
-
Cited by 830 (5 self)
- Add to MetaCart
for encoding knowledge on Web pages to make it understandable to electronic agents searching for information. The Defense Advanced Research Projects Agency (DARPA), in conjunction with the W3C, is developing DARPA Agent Markup Language (DAML) by extending RDF with more expressive constructs aimed
Efficient Representation and Validation of Logical Proofs
, 1997
"... This report describes a framework for representing and validating formal proofs in various axiomatic systems. The framework is based on the Edinburgh Logical Framework (LF) but is optimized for minimizing the size of proofs and the complexity of proof validation, by removing redundant representation ..."
Abstract
-
Cited by 47 (7 self)
- Add to MetaCart
proof of correctness of the reconstruction algorithm and hints for the efficient implementation using explicit substitutions. We conclude with a quantitative analysis of the algorithms. This research was sponsored in part by the Advanced Research Projects Agency CSTO under the title "The Fox
A Comparison of Data-Parallel Algorithms for Connected Components
- In Proc. 6th Ann. Symp. Parallel Algorithms and Architectures (SPAA-94
, 1994
"... This paper presents a pragmatic comparison of three parallel algorithms for finding connected components, together with optimizations on these algorithms. Those being compared are two similar algorithms by Awerbuch and Shiloach [2] and by Shiloach and Vishkin [19] and a randomized contraction algori ..."
Abstract
-
Cited by 30 (1 self)
- Add to MetaCart
of those tested. These comparisons are presented with NESL data-parallel code as executed on a Connection Machine 2. This research was sponsored in part by the Defense Advanced Research Projects Agency, CSTO, under the title "The Fox Project: Advanced Development of Systems Software", ARPA Order
Sequence Types for Functional Languages
, 1995
"... The use of types such as arrays, lazy lists, and other sequential types in Standard ML and other advanced languages can be made as natural and useful as the use of lists. These types are collectively referred to as sequences. This report presents a sequence interface which can be satisfied by every ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
was sponsored by the Advanced Research Projects Agency CSTO under the title "The Fox Project: A...
Incremental Recompilation for Standard ML of New Jersey
, 1994
"... The design and implementation of an incremental recompilation manager (IRM) for Standard ML of New Jersey (SML/NJ) is described. Truly separate compilation is difficult to implement correctly and efficiently for SML because one compilation unit may depend not only on the interface of another, but al ..."
Abstract
- Add to MetaCart
. This research was sponsored by the Defense Advanced Research Projects Agency, CSTO, under the title "The Fox Project: Advanced De...
Program Verification for Optimized Byte Copy
, 1994
"... We present a program to copy bytes, together with a formal specification and a proof that the code satisfies the specification. The program, which is in the critical path for a network implementation, has been tuned carefully over a period of time; the proof covers the entire program, and is easily ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Research Projects Agency, CSTO, under the title "The Fox Project: Advanced Development of Systems Software", ARPA Order No. 8313, issued by ESD/AVS under Contract No. F19628-91-C-0168. The views and conclusions contained in this document are those of the author and should not be interpreted
Program Verification for Optimized Byte Copy
, 1994
"... We present a program to copy bytes, together with a formal specification and a proof that the code satisfies the specification. The program, which is in the critical path for a network implementation, has been tuned carefully over a period of time; the proof covers the entire program, and is easily ..."
Abstract
- Add to MetaCart
Research Projects Agency, CSTO, under the title "The Fox Project: Advanced Development of Systems Software", ARPA Order No. 8313, issued by ESD/AVS under Contract No. F19628-91-C-0168. The views and conclusions contained in this document are those of the author and should not be interpreted
Results 1 - 10
of
9,576