Sciweavers

1088 search results - page 160 / 218
» Independence of Negative Constraints
Sort
View
IEEECIT
2009
IEEE
15 years 4 months ago
SLA-Aware Virtual Resource Management for Cloud Infrastructures
Cloud platforms host several independent applications on a shared resource pool with the ability to allocate computing power to applications on a per-demand basis. The use of serv...
Hien Nguyen Van, Frédéric Dang Tran,...
APPROX
2009
Springer
142views Algorithms» more  APPROX 2009»
15 years 4 months ago
Truthful Mechanisms via Greedy Iterative Packing
An important research thread in algorithmic game theory studies the design of efficient truthful mechanisms that approximate the optimal social welfare. A fundamental question is ...
Chandra Chekuri, Iftah Gamzu
IFM
2009
Springer
107views Formal Methods» more  IFM 2009»
15 years 4 months ago
Incremental Reasoning for Multiple Inheritance
Object-orientation supports code reuse and incremental programming. Multiple inheritance increases the power of code reuse, but complicates the binding of method calls and thereby ...
Johan Dovland, Einar Broch Johnsen, Olaf Owe, Mart...
PKDD
2009
Springer
155views Data Mining» more  PKDD 2009»
15 years 4 months ago
Dynamic Factor Graphs for Time Series Modeling
Abstract. This article presents a method for training Dynamic Factor Graphs (DFG) with continuous latent state variables. A DFG includes factors modeling joint probabilities betwee...
Piotr W. Mirowski, Yann LeCun
WOWMOM
2009
ACM
157views Multimedia» more  WOWMOM 2009»
15 years 4 months ago
The CHIANTI architecture for robust mobile Internet access
The quality of Internet access for mobile users may suffer from highly variable communication characteristics (packet loss, delay, throughput) and from temporary disconnections. T...
Jörg Ott, Petri Ylikoski, Nils Seifert, Caleb...