Sciweavers

175 search results - page 29 / 35
» Password policy simulation and analysis
Sort
View
CCGRID
2004
IEEE
14 years 22 days ago
Predicting job start times on clusters
In a Computational Grid which consists of many computer clusters, job start time predictions are useful to guide resource selections and balance the workload distribution. However...
Hui Li, David L. Groep, Jeffrey Templon, Lex Wolte...
ASAP
2006
IEEE
168views Hardware» more  ASAP 2006»
14 years 22 days ago
Dual-Processor Design of Energy Efficient Fault-Tolerant System
A popular approach to guarantee fault tolerance in safety-critical applications is to run the application on two processors. A checkpoint is inserted at the completion of the prim...
Shaoxiong Hua, Pushkin R. Pari, Gang Qu
CEC
2010
IEEE
13 years 10 months ago
Learning to overtake in TORCS using simple reinforcement learning
In modern racing games programming non-player characters with believable and sophisticated behaviors is getting increasingly challenging. Recently, several works in the literature ...
Daniele Loiacono, Alessandro Prete, Pier Luca Lanz...
IAJIT
2007
150views more  IAJIT 2007»
13 years 9 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
TWC
2008
238views more  TWC 2008»
13 years 8 months ago
Downlink resource allocation in multi-carrier systems: frequency-selective vs. equal power allocation
In this paper, a dynamic subcarrier and power allocation problem is considered in the context of asymptotic utility maximization in multi-carrier systems. Using the gradient-based...
Hyang-Won Lee, Song Chong