Sciweavers

56 search results - page 7 / 12
» Implementing Object-Z with Perfect Developer
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
Blind separation of non-negative sources by convex analysis: Effective method using linear programming
We recently reported a criterion for blind separation of non-negative sources, using a new concept called convex analysis for mixtures of non-negative sources (CAMNS). Under some ...
Tsung-Han Chan, Wing-Kin Ma, Chong-Yung Chi, Yue W...
ICDCS
2008
IEEE
14 years 4 months ago
Availability and Fairness Support for Storage QoS Guarantee
Multi-dimensional storage virtualization (MDSV) allows multiple virtual disks, each with a distinct combination of capacity, latency and bandwidth requirements, to be multiplexed ...
Gang Peng, Tzi-cker Chiueh
EUROPAR
2007
Springer
14 years 4 months ago
Program Behavior Characterization Through Advanced Kernel Recognition
Abstract. Understanding program behavior is at the foundation of program optimization. Techniques for automatic recognition of program constructs (from now on, computational kernel...
Manuel Arenaz, Juan Touriño, Ramon Doallo
AAAI
2000
13 years 11 months ago
Deliberation in Equilibrium: Bargaining in Computationally Complex Problems
We develop a normative theory of interaction-negotiation in particular--among self-interested computationally limited agents where computational actions are game-theoretically tre...
Kate Larson, Tuomas Sandholm
GLOBECOM
2008
IEEE
13 years 10 months ago
Highly Memory-Efficient LogLog Hash for Deep Packet Inspection
As the network line rates reach 40 Gbps today and 100 Gbps in the near future, performing deep packet inspection (DPI) in the Network Intrusion Detection and Prevention Systems (NI...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao