Results 1 - 10
of
3,774,631
The Knowledge Level
- In International Conference on Software Engineering
, 1982
"... The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying of this document without permission of its author may be prohibited by law. ..."
Abstract
-
Cited by 871 (1 self)
- Add to MetaCart
The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying of this document without permission of its author may be prohibited by law.
A Fast Marching Level Set Method for Monotonically Advancing Fronts
- PROC. NAT. ACAD. SCI
, 1995
"... We present a fast marching level set method for monotonically advancing fronts, which leads to an extremely fast scheme for solving the Eikonal equation. Level set methods are numerical techniques for computing the position of propagating fronts. They rely on an initial value partial differential eq ..."
Abstract
-
Cited by 617 (22 self)
- Add to MetaCart
We present a fast marching level set method for monotonically advancing fronts, which leads to an extremely fast scheme for solving the Eikonal equation. Level set methods are numerical techniques for computing the position of propagating fronts. They rely on an initial value partial differential
Determinants of Economic Growth: A Cross-Country Empirical Study
, 1996
"... Empirical findings for a panel of around 100 countries from 1960 to 1990 strongly support the general notion of conditional convergence. For a given starting level of real per capita GDP, the growth rate is enhanced by higher initial schooling and life expectancy, lower fertility, lower government c ..."
Abstract
-
Cited by 859 (14 self)
- Add to MetaCart
Empirical findings for a panel of around 100 countries from 1960 to 1990 strongly support the general notion of conditional convergence. For a given starting level of real per capita GDP, the growth rate is enhanced by higher initial schooling and life expectancy, lower fertility, lower government
Accurate transcription initiation by RNA polymerase II in a soluble extract from isolated mammalian nuclei. Nucleic Acids Res
, 1983
"... We have developed a procedure for preparing extracts from nuclei of human tissue culture cells that directs accurate transcription initiation in vitro from class II promoters. Conditions of extraction and assay have been optimized for maximum activity using the major late promoter of adenovirus 2. T ..."
Abstract
-
Cited by 1054 (11 self)
- Add to MetaCart
We have developed a procedure for preparing extracts from nuclei of human tissue culture cells that directs accurate transcription initiation in vitro from class II promoters. Conditions of extraction and assay have been optimized for maximum activity using the major late promoter of adenovirus 2
Shape modeling with front propagation: A level set approach
- IEEE Transactions on Pattern Analysis and Machine Intelligence
, 1995
"... Abstract- Shape modeling is an important constituent of computer vision as well as computer graphics research. Shape models aid the tasks of object representation and recognition. This paper presents a new approach to shape modeling which re-tains some of the attractive features of existing methods ..."
Abstract
-
Cited by 804 (20 self)
- Add to MetaCart
-secting, hypersurface flowing along its gradient field with con-stant speed or a speed that depends on the curvature. It is moved by solving a “Hamilton-Jacob? ’ type equation written for a func-tion in which the interface is a particular level set. A speed term synthesizpd from the image is used to stop the interface
Exokernel: An Operating System Architecture for Application-Level Resource Management
, 1995
"... We describe an operating system architecture that securely multiplexes machine resources while permitting an unprecedented degree of application-specific customization of traditional operating system abstractions. By abstracting physical hardware resources, traditional operating systems have signifi ..."
Abstract
-
Cited by 724 (24 self)
- Add to MetaCart
significantly limited the performance, flexibility, and functionality of applications. The exokernel architecture removes these limitations by allowing untrusted software to implement traditional operating system abstractions entirely at application-level. We have implemented a prototype exokernel-based system
The BSD Packet Filter: A New Architecture for User-level Packet Capture
, 1992
"... Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose workstations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can be m ..."
Abstract
-
Cited by 566 (2 self)
- Add to MetaCart
Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose workstations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can
SCRIBE: A large-scale and decentralized application-level multicast infrastructure
- IEEE Journal on Selected Areas in Communications (JSAC
, 2002
"... This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe supports large numbers of groups, with a potentially large number of members per group. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet, ..."
Abstract
-
Cited by 648 (29 self)
- Add to MetaCart
This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe supports large numbers of groups, with a potentially large number of members per group. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet
U-Net: A User-Level Network Interface for Parallel and Distributed Computing
- In Fifteenth ACM Symposium on Operating System Principles
, 1995
"... The U-Net communication architecture provides processes with a virtual view of a network interface to enable userlevel access to high-speed communication devices. The architecture, implemented on standard workstations using offthe-shelf ATM communication hardware, removes the kernel from the communi ..."
Abstract
-
Cited by 596 (17 self)
- Add to MetaCart
the communication path, while still providing full protection. The model presented by U-Net allows for the construction of protocols at user level whose performance is only limited by the capabilities of network. The architecture is extremely flexible in the sense that traditional protocols like TCP and UDP
Link-level Measurements from an 802.11b Mesh Network
- In SIGCOMM
, 2004
"... This paper anal yzes the causes of packetl oss in a 38-node urban mul ti-hop 802.11b network. The patterns and causes oflv# are important in the design of routing and errorcorrection proto colv as wel as in networkplqq"(v The paper makes the fol l owing observations. The distribution of inter-n ..."
Abstract
-
Cited by 565 (11 self)
- Add to MetaCart
This paper anal yzes the causes of packetl oss in a 38-node urban mul ti-hop 802.11b network. The patterns and causes oflv# are important in the design of routing and errorcorrection proto colv as wel as in networkplqq"(v The paper makes the fol l owing observations. The distribution of inter-nodel oss rates is rel'RfivD' uniform over the wh ol range oflv$ rates; there is no clq$ threshol separating "in range" and "out of range." Mostls ks have relj tivel stabl el oss rates from one second to the next, though a smal l minority have very burstyl osses at that time scal e. Sign al to-noise ratio and distance have lv tl e predictive val e forl oss rate. Thel arge number of lv ks with intermediate l oss rates is probabl y due to mul ti-path fading rather than attenuation or interference. The phenomena discussed here are al l wel l -known. The contributions of this paper are an understanding of their rel ative importance, of how they interact, and of the impl ications for MAC and routing protocol design.
Results 1 - 10
of
3,774,631