Sciweavers

1056 search results - page 147 / 212
» Handbook of mathematical functions
Sort
View
EMSOFT
2010
Springer
13 years 9 months ago
Load-based schedulability analysis of certifiable mixed-criticality systems
Many safety-critical embedded systems are subject to certification requirements. However, only a subset of the functionality of the system may be safety-critical and hence subject...
Haohan Li, Sanjoy K. Baruah
ASC
2011
13 years 6 months ago
Quality of Service constrained routing optimization using Evolutionary Computation
In this work, a novel optimization framework is proposed that allows the improvement of Quality of Service levels in TCP/IP based networks, by configuring the routing weights of ...
Miguel Rocha, Pedro Sousa, Paulo Cortez, Miguel Ri...
DASFAA
2011
IEEE
525views Database» more  DASFAA 2011»
13 years 2 months ago
StreamFitter: A Real Time Linear Regression Analysis System for Continuous Data Streams
In this demo, we present the StreamFitter system for real-time regression analysis on continuous data streams. In order to perform regression on data streams, it is necessary to co...
Chandima H. Nadungodage, Yuni Xia, Fang Li, Jaehwa...
ICDCN
2011
Springer
13 years 2 months ago
Reliable Networks with Unreliable Sensors
Abstract. Wireless sensor networks (WSNs) deployed in hostile environments suffer from a high rate of node failure. We investigate the effect of such failure rate on network conn...
Srikanth Sastry, Tsvetomira Radeva, Jianer Chen, J...
STOC
2007
ACM
140views Algorithms» more  STOC 2007»
14 years 11 months ago
On the submodularity of influence in social networks
We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the spread of influence in social networks. A social network can be represented by a directed graph where...
Elchanan Mossel, Sébastien Roch