Sciweavers

948 search results - page 143 / 190
» Analysis of SITA policies
Sort
View
NECO
2007
150views more  NECO 2007»
14 years 11 months ago
Reinforcement Learning, Spike-Time-Dependent Plasticity, and the BCM Rule
Learning agents, whether natural or artificial, must update their internal parameters in order to improve their behavior over time. In reinforcement learning, this plasticity is ...
Dorit Baras, Ron Meir
PE
2010
Springer
598views Optimization» more  PE 2010»
14 years 10 months ago
Server farms with setup costs
In this paper we consider server farms with a setup cost. This model is common in manufacturing systems and data centers, where there is a cost to turn servers on. Setup costs alw...
Anshul Gandhi, Mor Harchol-Balter, Ivo Adan
ESOP
2001
Springer
15 years 4 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
SSDBM
2000
IEEE
149views Database» more  SSDBM 2000»
15 years 4 months ago
Coordinating Simultaneous Caching of File Bundles from Tertiary Storage
In a previous paper [Shoshani et al 99], we described a system called STACS (Storage Access Coordination System) for High Energy and Physics (HEP) experiments. These experiments g...
Arie Shoshani, Alex Sim, Luis M. Bernardo, Henrik ...
KBSE
2010
IEEE
14 years 10 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer