Sciweavers

628 search results - page 20 / 126
» Scheduling Algorithm with Potential Behaviors
Sort
View
JSSPP
2004
Springer
14 years 1 months ago
Are User Runtime Estimates Inherently Inaccurate?
Computer system batch schedulers typically require information from the user upon job submission, including a runtime estimate. Inaccuracy of these runtime estimates, relative to ...
Cynthia Bailey Lee, Yael Schwartzman, Jennifer Har...
INFOCOM
2008
IEEE
14 years 2 months ago
Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
—We develop opportunistic scheduling policies for cognitive radio networks that maximize the throughput utility of the secondary (unlicensed) users subject to maximum collision c...
Rahul Urgaonkar, Michael J. Neely
ETFA
2005
IEEE
14 years 1 months ago
LEF closed-loop scheduling policy for real-time control systems
Today there is a significant body of results of resource management in real-time systems. However, most of them are based on "open-loop" strategies and techniques that do...
J. Yepez, Pau Martí, J. Ayza, Josep M. Fuer...
ICC
2007
IEEE
168views Communications» more  ICC 2007»
14 years 2 months ago
Opportunistic Link Scheduling with QoS Requirements in Wireless Ad Hoc Networks
— In this paper, we study the link layer scheduling problem in wireless ad hoc networks. In such a network, the communication links compete for the scarce and time-varying wirele...
Qing Chen, Qian Zhang, Zhisheng Niu
GECCO
1999
Springer
14 years 12 hour ago
An Immune System Approach to Scheduling in Changing Environments
This paper describes the application of an arti cial immune system, AIS, model to a scheduling application, in which sudden changes in the scheduling environment require the rap...
Emma Hart, Peter Ross