Sciweavers

210 search results - page 27 / 42
» Excludability and Bounded Computational Capacity
Sort
View
VLDB
1999
ACM
145views Database» more  VLDB 1999»
14 years 2 months ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...
WCNC
2010
IEEE
14 years 1 months ago
Adaptive Multiple Relay Selection Scheme for Cooperative Wireless Networks
Abstractā€”In this paper, we propose an output-threshold multiple relay selection scheme for dual-hop multi-branch cooperative wireless networks. The proposed scheme selects the ļ¬...
Gayan Amarasuriya, Masoud Ardakani, Chintha Tellam...
NETWORKS
2008
13 years 9 months ago
New dynamic programming algorithms for the resource constrained elementary shortest path problem
The resource-constrained elementary shortest path problem arises as a pricing subproblem in branch-and-price algorithms for vehicle routing problems with additional constraints. W...
Giovanni Righini, Matteo Salani
DAC
1997
ACM
14 years 2 months ago
System-Level Synthesis of Low-Power Hard Real-Time Systems
We present a system-level approach for power optimization under a set of user speciļ¬ed costs and timing constraints of hard real-time designs. The approach optimizes all three d...
Darko Kirovski, Miodrag Potkonjak
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
14 years 4 months ago
Virtual private caches
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems. VPMs incorporate microarchitecture mechanisms that allow shares of h...
Kyle J. Nesbit, James Laudon, James E. Smith