Sciweavers

459 search results - page 62 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
RTAS
2006
IEEE
14 years 1 months ago
Network-Code Machine: Programmable Real-Time Communication Schedules
Distributed hard real-time systems require guaranteed communication. One common approach is to restrict network access by enforcing a time-division multiple access (TDMA) schedule...
Sebastian Fischmeister, Oleg Sokolsky, Insup Lee
DATE
2005
IEEE
155views Hardware» more  DATE 2005»
14 years 1 months ago
Studying Storage-Recomputation Tradeoffs in Memory-Constrained Embedded Processing
Fueled by an unprecedented desire for convenience and self-service, consumers are embracing embedded technology solutions that enhance their mobile lifestyles. Consequently, we wi...
Mahmut T. Kandemir, Feihui Li, Guilin Chen, Guangy...
TPDS
2010
145views more  TPDS 2010»
13 years 6 months ago
Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs
—In this paper, we consider the issue of efficient broadcasting in mobile ad hoc networks (MANETs) using network coding and directional antennas. Network coding-based broadcastin...
Shuhui Yang, Jie Wu
JMLR
2010
194views more  JMLR 2010»
13 years 2 months ago
Graphical Gaussian modelling of multivariate time series with latent variables
In time series analysis, inference about causeeffect relationships among multiple times series is commonly based on the concept of Granger causality, which exploits temporal struc...
Michael Eichler
SDM
2012
SIAM
233views Data Mining» more  SDM 2012»
11 years 10 months ago
On Finding Joint Subspace Boolean Matrix Factorizations
Finding latent factors of the data using matrix factorizations is a tried-and-tested approach in data mining. But finding shared factors over multiple matrices is more novel prob...
Pauli Miettinen