Sciweavers

3820 search results - page 730 / 764
» Bounded Model Debugging
Sort
View
SIGMETRICS
2009
ACM
126views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
Self-adaptive admission control policies for resource-sharing systems
We consider the problem of admission control in resource sharing systems, such as web servers and transaction processing systems, when the job size distribution has high variabili...
Varun Gupta, Mor Harchol-Balter
VRST
2009
ACM
14 years 4 months ago
The virtual magic lantern: an interaction metaphor for enhanced medical data inspection
In Volume Rendering, it is difficult to simultaneously visualize interior and exterior structures. Several approaches have been developed to solve this problem, such as cut-away ...
Eva Monclús, José Díaz, Isabe...
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
14 years 4 months ago
Convergence of rule-of-thumb learning rules in social networks
— We study the problem of dynamic learning by a social network of agents. Each agent receives a signal about an underlying state and communicates with a subset of agents (his nei...
Daron Acemoglu, Angelia Nedic, Asuman E. Ozdaglar
CODES
2008
IEEE
14 years 4 months ago
Static analysis of processor stall cycle aggregation
Processor Idle Cycle Aggregation (PICA) is a promising approach for low power execution of processors, in which small memory stalls are aggregated to create a large one, and the p...
Jongeun Lee, Aviral Shrivastava
INFOCOM
2008
IEEE
14 years 4 months ago
On the Performance of IEEE 802.11 under Jamming
—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We study two chann...
Emrah Bayraktaroglu, Christopher King, Xin Liu, Gu...