Sciweavers

628 search results - page 82 / 126
» Scheduling Algorithm with Potential Behaviors
Sort
View
122
Voted
DSOM
2003
Springer
15 years 7 months ago
An Epidemic Protocol for Managing Routing Tables in Very Large Peer-to-Peer Networks
Building self-maintained overlay networks for message routing has recently attracted significant research interest [5–9]. All suggested solutions have a common goal: To build an...
Spyros Voulgaris, Maarten van Steen
ACSD
1998
IEEE
90views Hardware» more  ACSD 1998»
15 years 6 months ago
Verification of Pipelined Microprocessors by Correspondence Checking in Symbolic Ternary Simulation
This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory shadowing, an extension of Burch and Dill's pipeline verification method [...
Miroslav N. Velev, Randal E. Bryant
DAC
2010
ACM
15 years 4 months ago
Network on chip design and optimization using specialized influence models
In this study, we propose the use of specialized influence models to capture the dynamic behavior of a Network-onChip (NoC). Our goal is to construct a versatile modeling framewor...
Cristinel Ababei
123
Voted
IJCAI
1989
15 years 3 months ago
Unrestricted And-Parallel Execution of Logic Programs with Dependency Directed Backtracking
A model of unrestricted And-parallel execution for logic programs is described, based on Dependency Directed Backtracking (DDBT) aimed at improving the efficiency of execution whi...
Nikos Drakos
114
Voted
NAACL
2010
15 years 12 days ago
Not All Seeds Are Equal: Measuring the Quality of Text Mining Seeds
Open-class semantic lexicon induction is of great interest for current knowledge harvesting algorithms. We propose a general framework that uses patterns in bootstrapping fashion ...
Zornitsa Kozareva, Eduard H. Hovy