Sciweavers

370 search results - page 67 / 74
» Independent Sets with Domination Constraints
Sort
View
EMSOFT
2011
Springer
13 years 11 months ago
Hard-real-time scheduling of data-dependent tasks in embedded streaming applications
Most of the hard-real-time scheduling theory for multiprocessor systems assumes independent periodic or sporadic tasks. Such a simple task model is not directly applicable to mode...
Mohamed Bamakhrama, Todor Stefanov
SIGECOM
2009
ACM
108views ECommerce» more  SIGECOM 2009»
15 years 6 months ago
Selling ad campaigns: online algorithms with cancellations
We study online pricing problems in markets with cancellations, i.e., markets in which prior allocation decisions can be revoked, but at a cost. In our model, a seller receives re...
Moshe Babaioff, Jason D. Hartline, Robert D. Klein...
CASES
2007
ACM
15 years 3 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
BMCBI
2006
141views more  BMCBI 2006»
14 years 11 months ago
Identification of consensus RNA secondary structures using suffix arrays
Background: The identification of a consensus RNA motif often consists in finding a conserved secondary structure with minimum free energy in an ensemble of aligned sequences. How...
Mohammad Anwar, Truong Nguyen, Marcel Turcotte
TODAES
2002
134views more  TODAES 2002»
14 years 11 months ago
False-noise analysis using logic implications
ct Cross-coupled noise analysis has become a critical concern in today's VLSI designs. Typically, noise analysis makes an assumption that all aggressing nets can simultaneousl...
Alexey Glebov, Sergey Gavrilov, David Blaauw, Vlad...