Sciweavers

832 search results - page 97 / 167
» Effect of Malicious Synchronization
Sort
View
ICCAD
2008
IEEE
115views Hardware» more  ICCAD 2008»
14 years 6 months ago
Minimizing the energy cost of throughput in a linear pipeline by opportunistic time borrowing
- In this paper, we present a technique to optimize the energy-delay product of a synchronous linear pipeline circuit with dynamic error detection and correction capability running...
Mohammad Ghasemazar, Massoud Pedram
IPPS
2003
IEEE
14 years 3 months ago
An Executable Analytical Performance Evaluation Approach for Early Performance Prediction
Percolation has recently been proposed as a key component of an advanced program execution model for future generation high-end machines featuring adaptive data/code transformatio...
Adeline Jacquet, Vincent Janot, Clement Leung, Gua...
AGENTS
1999
Springer
14 years 2 months ago
Top-Down Search for Coordinating the Hierarchical Plans of Multiple Agents
Uncertain and complex environments demand that an agent be able to anticipate the actions of others in order to avoid resource conflicts with them and to realize its goals. Confli...
Bradley J. Clement, Edmund H. Durfee
LCN
1997
IEEE
14 years 2 months ago
Early Selective Packet Discard for Alternating Resource Access of TCP over ATM-UBR
W e investigate packet discarding schemes for TCP over ATM with UBR service. In doing so, we tested the eflective throughput of two existing schemes, Partial Pnwlcet Discard(PPD) ...
Kangsik Cheon, Shivendra S. Panwar
PE
2008
Springer
167views Optimization» more  PE 2008»
13 years 10 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi