Sciweavers

1791 search results - page 201 / 359
» Behavioral Operations
Sort
View
AIPS
2009
15 years 5 months ago
Enhancing the Context-Enhanced Additive Heuristic with Precedence Constraints
Recently, Helmert and Geffner proposed the context-enhanced additive heuristic, where fact costs are evaluated relative to context states that arise from achieving first a pivot c...
Dunbo Cai, Jörg Hoffmann, Malte Helmert
ENTCS
2007
94views more  ENTCS 2007»
15 years 4 months ago
Virtual Organizations in Arigatoni
Arigatoni is a lightweight overlay network that deploys the Global Computing Paradigm over the Internet. Communication for over the behavioral units of the overlay is performed by...
Michel Cosnard, Luigi Liquori, Raphaël Chand
AC
2005
Springer
15 years 4 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee
INFORMATICALT
2007
123views more  INFORMATICALT 2007»
15 years 4 months ago
Design and Implementation of Parallel Counterpropagation Networks Using MPI
The objective of this research is to construct parallel models that simulate the behavior of artificial neural networks. The type of network that is simulated in this project is t...
Athanasios Margaris, Stavros Souravlas, Efthimios ...
CCR
2004
151views more  CCR 2004»
15 years 3 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster