Sciweavers

36 search results - page 3 / 8
» A Characterization of 2-Player Mechanisms for Scheduling
Sort
View
CISS
2008
IEEE
14 years 23 days ago
Imperfect randomized algorithms for the optimal control of wireless networks
Abstract— We consider a joint randomized scheduling, congestion control mechanism for general wireless networks. We allow for a set of imperfections in the operation of the rando...
Atilla Eryilmaz, Asuman E. Ozdaglar, Devavrat Shah...
ICS
2005
Tsinghua U.
13 years 11 months ago
Power-aware resource allocation in high-end systems via online simulation
Traditionally, scheduling in high-end parallel systems focuses on how to minimize the average job waiting time and on how to maximize the overall system utilization. Despite the d...
Barry Lawson, Evgenia Smirni
ISCC
2005
IEEE
13 years 12 months ago
Describing Multidimensional Schedules for Media-Access Control in Time-Triggered Communication
A shared communication medium is characterized by multiple entities that use this medium by reading and writing from and to it. Write operations on the shared communication medium...
Sebastian Fischmeister
INFOCOM
2006
IEEE
14 years 9 days ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
WINE
2009
Springer
178views Economy» more  WINE 2009»
14 years 27 days ago
The Geometry of Truthfulness
We study the geometrical shape of the partitions of the input space created by the allocation rule of a truthful mechanism for multi-unit auctions with multidimensional types and ...
Angelina Vidali