Sciweavers

1755 search results - page 102 / 351
» An efficient simulation algorithm based on abstract interpre...
Sort
View
OPODIS
2010
15 years 29 days ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal
ICCD
2004
IEEE
103views Hardware» more  ICCD 2004»
15 years 12 months ago
A Fast Delay Analysis Algorithm for The Hybrid Structured Clock Network
This paper presents a novel approach to reducing the complexity of the transient linear circuit analysis for a hybrid structured clock network. Topology reduction is first used to...
Yi Zou, Yici Cai, Qiang Zhou, Xianlong Hong, Sheld...
IPPS
1998
IEEE
15 years 7 months ago
Benchmarking the Task Graph Scheduling Algorithms
The problem of scheduling a weighted directed acyclic graph (DAG) to a set of homogeneous processors to minimize the completion time has been extensively studied. The NPcompletene...
Yu-Kwong Kwok, Ishfaq Ahmad
TC
2002
15 years 2 months ago
Distributed Call Admission Control for a Heterogeneous PCS Network
Abstract--Personal communication service (PCS) networks offer mobile users multimedia applications with different quality-ofservice (QoS) and bandwidth requirements. This paper pro...
Yieh-Ran Haung, Jan-Ming Ho
ISAAC
2010
Springer
291views Algorithms» more  ISAAC 2010»
15 years 29 days ago
A Tighter Analysis of Work Stealing
Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost...
Marc Tchiboukdjian, Nicolas Gast, Denis Trystram, ...