Sciweavers

1049 search results - page 125 / 210
» Simulation of load balancing algorithms: a comparative study
Sort
View
ISAAC
2010
Springer
291views Algorithms» more  ISAAC 2010»
13 years 8 months ago
A Tighter Analysis of Work Stealing
Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost...
Marc Tchiboukdjian, Nicolas Gast, Denis Trystram, ...
JDCTA
2010
135views more  JDCTA 2010»
13 years 5 months ago
Signal Framing Methods of Automotive Embedded Networked Control System for Bandwidth Consumption Optimization
Parameter (or variable) of automotive embedded networked control system is named as signal. In order to improve system performance and provide more remaining bandwidth for system ...
Jian Hu, Gangyan Li, Yeqiong Song
AAAI
2006
13 years 11 months ago
Boosting Expert Ensembles for Rapid Concept Recall
Many learning tasks in adversarial domains tend to be highly dependent on the opponent. Predefined strategies optimized for play against a specific opponent are not likely to succ...
Achim Rettinger, Martin Zinkevich, Michael H. Bowl...
ICS
2009
Tsinghua U.
13 years 7 months ago
R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems
Data de-duplication has become a commodity component in dataintensive systems and it is required that these systems provide high reliability comparable to others. Unfortunately, b...
Chuanyi Liu, Yu Gu, Linchun Sun, Bin Yan, Dongshen...
FGCS
2006
87views more  FGCS 2006»
13 years 10 months ago
Task distribution with a random overlay network
We consider a model where commodity service providers are offering commodity computational services to a set of customers. We provide a solution for the efficient distribution of ...
Ladislau Bölöni, Damla Turgut, Dan C. Ma...