Sciweavers

1045 search results - page 105 / 209
» The Use of Exceptions
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network
When Disruption Tolerant Network (DTN) is used in commercial environments, incentive mechanism should be employed to encourage cooperation among selfish mobile users. Key challen...
Bin Bin Chen, Mun Choon Chan
TNN
2010
155views Management» more  TNN 2010»
13 years 2 months ago
Incorporating the loss function into discriminative clustering of structured outputs
Clustering using the Hilbert Schmidt independence criterion (CLUHSIC) is a recent clustering algorithm that maximizes the dependence between cluster labels and data observations ac...
Wenliang Zhong, Weike Pan, James T. Kwok, Ivor W. ...
ISLPED
2003
ACM
100views Hardware» more  ISLPED 2003»
14 years 1 months ago
Checkpointing alternatives for high performance, power-aware processors
High performance processors use checkpointing to rapidly recover from branch mispredictions and possibly other exceptions. We demonstrate that conventional checkpointing becomes u...
Andreas Moshovos
ISCC
2002
IEEE
14 years 1 months ago
Resource and performance management in wireless communication networks
In this paper, we study the problems of resource and performance management in channelized wireless networks. For identifying research issues systematically, we propose a research...
Chih-Hao Lin, Frank Yeong-Sung Lin
AAAI
2008
13 years 10 months ago
The Impact of Vertical Specialization on Hierarchical Multi-Agent Systems
Hierarchies are one of the most common organizational structures observed in multi-agent systems. In this paper we study vertical specialization as a reason for hierarchical struc...
Steven Okamoto, Paul Scerri, Katia P. Sycara