Sciweavers

1184 search results - page 104 / 237
» Nearness relations and topology
Sort
View
INFOCOM
1993
IEEE
14 years 2 months ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager
ICDE
2002
IEEE
110views Database» more  ICDE 2002»
14 years 11 months ago
A Publish & Subscribe Architecture for Distributed Metadata Management
The emergence of electronic marketplaces and other electronic services and applications on the Internet is creating a growing demand for effective management of resources. Due to ...
Markus Keidl, Alexander Kreutz, Alfons Kemper, Don...
ICML
2004
IEEE
14 years 11 months ago
Learning to fly by combining reinforcement learning with behavioural cloning
Reinforcement learning deals with learning optimal or near optimal policies while interacting with the environment. Application domains with many continuous variables are difficul...
Eduardo F. Morales, Claude Sammut
CP
2009
Springer
14 years 10 months ago
Confidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing ...
Geoffrey Chu, Christian Schulte, Peter J. Stuckey
IWPC
2008
IEEE
14 years 4 months ago
Assessing Software Archives with Evolutionary Clusters
The way in which a system’s software archive is partitioned influences the evolvability of that system. The partition of a software archive is mostly assessed by looking at the...
Adam Vanya, Lennart Holland, A. Steven Klusener, P...