Sciweavers

3515 search results - page 104 / 703
» Resource usage analysis
Sort
View
139
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Cuckoo sampling: Robust collection of flow aggregates under a fixed memory budget
—Collecting per-flow aggregates in high-speed links is challenging and usually requires traffic sampling to handle peak rates and extreme traffic mixes. Static selection of sa...
Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Nick...
116
Voted
RTAS
2008
IEEE
15 years 9 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...
110
Voted
RTSS
2005
IEEE
15 years 8 months ago
Improving Soft Real-Time Performance through Better Slack Reclaiming
Modern operating systems frequently support applications with a variety of timing constraints including hard real-time, soft real-time, and best-effort. To guarantee performance, ...
Caixue Lin, Scott A. Brandt
136
Voted
GECON
2008
Springer
134views Business» more  GECON 2008»
15 years 3 months ago
Rational Bidding Using Reinforcement Learning
The application of autonomous agents by the provisioning and usage of computational resources is an attractive research field. Various methods and technologies in the area of arti...
Nikolay Borissov, Arun Anandasivam, Niklas Wirstr&...
111
Voted
JNW
2008
122views more  JNW 2008»
15 years 2 months ago
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems
The capabilities of a sensor network are strongly influenced by the operating system used on the sensor nodes. In general, two different sensor network operating system types are c...
Cormac Duffy, Utz Roedig, John Herbert, Cormac J. ...