Sciweavers

672 search results - page 98 / 135
» Words and forbidden factors
Sort
View
SIAMJO
2008
114views more  SIAMJO 2008»
13 years 8 months ago
An Inexact SQP Method for Equality Constrained Optimization
We present an algorithm for large-scale equality constrained optimization. The method is based on a characterization of inexact sequential quadratic programming (SQP) steps that ca...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
ALGORITHMICA
2005
84views more  ALGORITHMICA 2005»
13 years 8 months ago
Optimal Read-Once Parallel Disk Scheduling
An optimal prefetching and I/O scheduling algorithm L-OPT, for parallel I/O systems, using a read-once model of block references is presented. The algorithm uses knowledge of the n...
Mahesh Kallahalla, Peter J. Varman
TCOM
2008
68views more  TCOM 2008»
13 years 8 months ago
Analysis and design of book-ahead bandwidth-sharing mechanisms
In this article, we present a novel discrete-time Markov chain model of book-ahead bandwidthsharing mechanisms. We use this analytical model and a simulation model to understand t...
Xiangfei Zhu, Malathi Veeraraghavan
TCS
2008
13 years 8 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
JTAER
2007
125views more  JTAER 2007»
13 years 8 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...