Sciweavers

3096 search results - page 610 / 620
» Theory and Use of the EM Algorithm
Sort
View
EMSOFT
2004
Springer
14 years 2 months ago
Scheduling within temporal partitions: response-time analysis and server design
As the bandwidth of CPUs and networks continues to grow, it becomes more attractive, for efficiency reasons, to share such resources among several applications with the minimum le...
Luís Almeida, Paulo Pedreiras
EMSOFT
2004
Springer
14 years 2 months ago
Making mechatronic agents resource-aware in order to enable safe dynamic resource allocation
Mechatronic systems are embedded software systems with hard real-time requirements. Predictability is of paramount importance for these systems. Thus, their design has to take the...
Sven Burmester, Matthias Gehrke, Holger Giese, Sim...
PLDI
2003
ACM
14 years 1 months ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 1 months ago
Solving combinatorial exchanges: optimality via a few partial bids
We investigate the problem of matching buyers and sellers in a multi-item multi-unit combinatorial exchange so as to maximize either the surplus (revenue minus cost) or the tradin...
Anshul Kothari, Tuomas Sandholm, Subhash Suri
WSNA
2003
ACM
14 years 1 months ago
Information assurance in sensor networks
Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance f...
Budhaditya Deb, Sudeept Bhatnagar, Badri Nath