Sciweavers

1844 search results - page 125 / 369
» Exploiting the Structure of Distributed Constraint Optimizat...
Sort
View
HICSS
2011
IEEE
183views Biometrics» more  HICSS 2011»
14 years 8 months ago
Optimizing Access across Multiple Hierarchies in Data Warehouses
In enterprise data warehouses, different users in different business units often define their own application specific dimension hierarchies tailor made to their reporting and b...
Lipyeow Lim, Bishwaranjan Bhattacharjee
CASES
2003
ACM
15 years 10 months ago
Architectural optimizations for low-power, real-time speech recognition
The proliferation of computing technology to low power domains such as hand–held devices has lead to increased interest in portable interface technologies, with particular inter...
Rajeev Krishna, Scott A. Mahlke, Todd M. Austin
SODA
2001
ACM
125views Algorithms» more  SODA 2001»
15 years 6 months ago
Parallel processor scheduling with delay constraints
We consider the problem of scheduling unit-length jobs on identical parallel machines such that the makespan of the resulting schedule is minimized. Precedence constraints impose ...
Daniel W. Engels, Jon Feldman, David R. Karger, Ma...
ATAL
2007
Springer
15 years 11 months ago
SSDPOP: improving the privacy of DCOP with secret sharing
Multi-agent systems designed to work collaboratively with groups of people typically require private information that people will entrust to them only if they have assurance that ...
Rachel Greenstadt, Barbara J. Grosz, Michael D. Sm...
TECS
2010
74views more  TECS 2010»
15 years 3 months ago
Recovering from distributable thread failures in distributed real-time Java
We consider the problem of recovering from failures of distributable threads (“threads”) in distributed realtime systems that operate under run-time uncertainties including th...
Edward Curley, Binoy Ravindran, Jonathan Stephen A...