Sciweavers

639 search results - page 41 / 128
» Dominance Constraints with Set Operators
Sort
View
AIPS
2008
15 years 1 days ago
Fast Dynamic Scheduling of Disjunctive Temporal Constraint Networks through Incremental Compilation
Autonomous systems operating in real-world environments must plan, schedule, and execute missions while robustly adapting to uncertainty and disturbance. One way to mitigate the e...
Julie A. Shah, Brian C. Williams
MICRO
2009
IEEE
120views Hardware» more  MICRO 2009»
15 years 4 months ago
SCARAB: a single cycle adaptive routing and bufferless network
As technology scaling drives the number of processor cores upward, current on-chip routers consume substantial portions of chip area and power budgets. Since existing research has...
Mitchell Hayenga, Natalie D. Enright Jerger, Mikko...
SOSP
2005
ACM
15 years 6 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
ICDCSW
2006
IEEE
15 years 3 months ago
An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health
— Healthcare and economic drivers have increased the desire to deploy systems for continuous monitoring of patients, both in hospital and outpatient settings. Such systems must o...
Stephen Strowes, Nagwa Badr, Steven Heeps, Emil Lu...
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
15 years 11 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...