Sciweavers

370 search results - page 67 / 74
» Independent Sets with Domination Constraints
Sort
View
EMSOFT
2011
Springer
12 years 9 months ago
Hard-real-time scheduling of data-dependent tasks in embedded streaming applications
Most of the hard-real-time scheduling theory for multiprocessor systems assumes independent periodic or sporadic tasks. Such a simple task model is not directly applicable to mode...
Mohamed Bamakhrama, Todor Stefanov
SIGECOM
2009
ACM
108views ECommerce» more  SIGECOM 2009»
14 years 4 months ago
Selling ad campaigns: online algorithms with cancellations
We study online pricing problems in markets with cancellations, i.e., markets in which prior allocation decisions can be revoked, but at a cost. In our model, a seller receives re...
Moshe Babaioff, Jason D. Hartline, Robert D. Klein...
CASES
2007
ACM
14 years 1 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
BMCBI
2006
141views more  BMCBI 2006»
13 years 9 months ago
Identification of consensus RNA secondary structures using suffix arrays
Background: The identification of a consensus RNA motif often consists in finding a conserved secondary structure with minimum free energy in an ensemble of aligned sequences. How...
Mohammad Anwar, Truong Nguyen, Marcel Turcotte
TODAES
2002
134views more  TODAES 2002»
13 years 9 months ago
False-noise analysis using logic implications
ct Cross-coupled noise analysis has become a critical concern in today's VLSI designs. Typically, noise analysis makes an assumption that all aggressing nets can simultaneousl...
Alexey Glebov, Sergey Gavrilov, David Blaauw, Vlad...