Browsing LCS Publications by Title
Now showing items 97-116 of 1163
-
Backup and Recovery of On-line Information in a Computer Utility
(1974-01)This thesis describes a design for an automatic backup mechanism to be incorporated in a computer utility for the protection of on-line information against accidental or malicious destruction. This protection is achieved ... -
Bandwidth Management in Wireless Sensor Networks
(2003-04)Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers ÔøΩpullÔøΩ information from remote sensors and ÔøΩpushÔøΩ actuations into the network. The ... -
Baring it all to Software: The Raw Machine
(1997-03)Rapid advances in technology force a quest for computer architectures that exploit new opportunities and shed existing mechanisms that do not scale. Current architectures, such as hardware scheduled superscalars, are ... -
Bicontinuous Extensions of Invertible Combinatorial Functions
(1979-01)We discuss and solve the problem of constructing a diffeomorphic componentwise extension for an arbitrary invertible combinatorial function. Interpreted in physical terms, our solution constitutes a proof of the physical ... -
Bitwidth Analysis with Application to Silicon Compilation
(1999-11)In this paper introduces Bitwise, a compiler that minimizes the bitwidth - the number of bits used to represent each operand - for both integers and pointers in a program. By propagating static information both forward and ... -
Blueware: Bluetooth Simulator for ns
(2002-10) -
Boolean Compilation of Relational Specifications
(1998-01)A new method for analyzing relational specifications is described. A property to be checked is cast as a relational formula, which, if the property holds, has no finite models. The relational formula is translated into a ... -
Boston Community Information System - 1986 Experimental Test Results
(1987-08)This report describes the first year of an experimental test of the Boston Community Information System (Boston CommInS). The experiment implements new ideas of data communication and database design in the transmission ... -
Boston Community Information System User Manual (Version 6.0)
(1986-04)The Boston Community Information System turns your computer into a personal information assistant that monitors the news as it happens. This experiment, CommInS, tests a new way of distributing world news and features ... -
Boston Community Information System User's Manual
(1987-10)The Boston Community Information System turns your computer into a personal information assistant that monitors the news as it happens. This experiment, CommInS, tests a new way of distributing world news as it happens ... -
Bounded Width Branching Programs
(1986-06)We examine the branching program model of computation and in particular the classes of languages which can be recognized when the width of the programs is bounded by a constant. After slightly revising the framework of ... -
Bounded-Error Interactive Ray Tracing
(1998-03) -
Bounds on Information Retrieval Efficiency in Static File Structures
(1971-06)This research addresses the problem of file organization for efficient information retrieval when each file item may be accessed through any one of a large number of identification keys. The emphasis is on library problems, ... -
Bounds on the Scheduling of Types Task Systems
(1978-09)We study the scheduling of different types of tasks on different types of processors. If there are k types of tasks and mi identifical processors for takss of type I, the finishing times of any demand driven or list schedule ... -
BRAND X Manual
(1980-11)BRAND X is a simple representation language implemented as a pure extension of LISP. BRAND X provides the following additional facilities over LISP: Unique and canonical structures, property lists for all objects, labels ... -
A Brief Overview of the GSM Radio Interface
(1996-03)This technical memorandum contains a compilation of several papers, reports and books relative to the GSM-900 radio interface. It is not exhaustive and it is restricted to the Traffic Channel/Full-Rate Speech (TCH/FS). -
Building an Active Node on the Internet
(1997-05) -
Building Data Structures on Untrusted Peer-to-Peer Storage with Per-participant Logs
(2003-03)L* is a technique for building multi-user distributed data structures out of untrusted peer-to-peer distributed hash tables (DHTs). L* uses multiple logs, one log per participant, to store changes to the data structure. ...