Sciweavers

10907 search results - page 2123 / 2182
» Constraint Based Strategies
Sort
View
IEEEARES
2006
IEEE
15 years 3 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
IPPS
2006
IEEE
15 years 3 months ago
Composite Abortable Locks
The need to allow threads to abort an attempt to acquire a lock (sometimes called a timeout) is an interesting new requirement driven by state-of-the-art database applications wit...
Virendra J. Marathe, Mark Moir, Nir Shavit
IPPS
2006
IEEE
15 years 3 months ago
Supporting self-adaptation in streaming data mining applications
There are many application classes where the users are flexible with respect to the output quality. At the same time, there are other constraints, such as the need for real-time ...
Liang Chen, Gagan Agrawal
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
15 years 3 months ago
Differential and geometric properties of Rayleigh quotients with applications
the following cost functions: In this paper, learning rules are proposed for simultaneous corn- GI(U) = tr{(UTU)(UTBU)-lD, (la) putation of minor eigenvectors of a covariance matri...
M. A. Hasan
ISPASS
2006
IEEE
15 years 3 months ago
Critical path analysis of the TRIPS architecture
Fast, accurate, and effective performance analysis is essential for the design of modern processor architectures and improving application performance. Recent trends toward highly...
Ramadass Nagarajan, Xia Chen, Robert G. McDonald, ...
« Prev « First page 2123 / 2182 Last » Next »