Sciweavers

3820 search results - page 675 / 764
» Bounded Model Debugging
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan
TCOM
2008
118views more  TCOM 2008»
13 years 8 months ago
Performance analysis for collaborative decoding with least-reliable-bits exchange on AWGN channels
Collaborative decoding is an approach that can achieve diversity and combining gain by exchanging decoding information among a cluster of physically separated receivers. On AWGN ch...
Xin Li, Tan F. Wong, John M. Shea
JMLR
2010
143views more  JMLR 2010»
13 years 8 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...
JPDC
2010
106views more  JPDC 2010»
13 years 8 months ago
Feedback-directed page placement for ccNUMA via hardware-generated memory traces
Non-uniform memory architectures with cache coherence (ccNUMA) are becoming increasingly common, not just for large-scale high performance platforms but also in the context of mul...
Jaydeep Marathe, Vivek Thakkar, Frank Mueller
MANSCI
2010
70views more  MANSCI 2010»
13 years 8 months ago
Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy
This paper analytically explores the effect of software bundling on software piracy. We focus on piracy at individual user level where several individuals illegitimately share a s...
Ram D. Gopal, Alok Gupta