Sciweavers

249 search results - page 32 / 50
» Analysis of Resource Lower Bounds in Real-Time Applications
Sort
View
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
15 years 3 months ago
Virtual private caches
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems. VPMs incorporate microarchitecture mechanisms that allow shares of h...
Kyle J. Nesbit, James Laudon, James E. Smith
NCA
2009
IEEE
15 years 4 months ago
Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead
—It has been observed in recent years that in many applications service time demands are highly variable. Without foreknowledge of exact service times of individual jobs, process...
Steve Thompson, Lester Lipsky, Sarah Tasneem, Feng...
ICML
2008
IEEE
15 years 10 months ago
On the quantitative analysis of deep belief networks
Deep Belief Networks (DBN's) are generative models that contain many layers of hidden variables. Efficient greedy algorithms for learning and approximate inference have allow...
Ruslan Salakhutdinov, Iain Murray
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 4 months ago
Analysis of a General Mixed Strategy for Gaussian Multiple Relay Channels
— In their landmark paper Cover and El Gamal proposed different coding strategies for the relay channel with a single relay supporting a communication pair. These strategies are ...
Peter Rost, Gerhard Fettweis
ICLP
1997
Springer
15 years 1 months ago
Non-Failure Analysis for Logic Programs
We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at leas...
Saumya K. Debray, Pedro López-García...