Sciweavers

3820 search results - page 675 / 764
» Bounded Model Debugging
Sort
View
INFOCOM
2010
IEEE
15 years 17 days ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan
TCOM
2008
118views more  TCOM 2008»
15 years 17 days ago
Performance analysis for collaborative decoding with least-reliable-bits exchange on AWGN channels
Collaborative decoding is an approach that can achieve diversity and combining gain by exchanging decoding information among a cluster of physically separated receivers. On AWGN ch...
Xin Li, Tan F. Wong, John M. Shea
JMLR
2010
143views more  JMLR 2010»
15 years 16 days ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...
JPDC
2010
106views more  JPDC 2010»
15 years 16 days ago
Feedback-directed page placement for ccNUMA via hardware-generated memory traces
Non-uniform memory architectures with cache coherence (ccNUMA) are becoming increasingly common, not just for large-scale high performance platforms but also in the context of mul...
Jaydeep Marathe, Vivek Thakkar, Frank Mueller
MANSCI
2010
70views more  MANSCI 2010»
15 years 16 days ago
Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy
This paper analytically explores the effect of software bundling on software piracy. We focus on piracy at individual user level where several individuals illegitimately share a s...
Ram D. Gopal, Alok Gupta