Sciweavers

790 search results - page 104 / 158
» Limits of Work-Stealing Scheduling
Sort
View
IAT
2008
IEEE
15 years 7 months ago
Negotiation in Semi-cooperative Agreement Problems
In this paper we introduce the Semi-Cooperative Extended Incremental Multiagent Agreement Problem with Preferences (SC-EIMAPP). In SC-EIMAPPs, variables arise over time. For each ...
Elisabeth Crawford, Manuela M. Veloso
108
Voted
RTAS
2008
IEEE
15 years 7 months ago
TOSSTI: Saving Time and Energy in TinyOS with Software Thread Integration
Many wireless sensor nodes (motes) interface with slow peripheral devices, requiring the processor to wait. These delays waste time, energy and power, which are valuable but limit...
Zane D. Purvis, Alexander G. Dean
82
Voted
VTC
2008
IEEE
157views Communications» more  VTC 2008»
15 years 7 months ago
Performance of MIMO Aware RRM in Downlink OFDMA
— This paper addresses advanced radio resource management (RRM) algorithms for multiple-input multipleoutput (MIMO) transmission schemes in downlink OFDMA systems. The analysis c...
István Z. Kovács, Markku Kuusela, El...
BTW
2007
Springer
190views Database» more  BTW 2007»
15 years 6 months ago
Web Services and Data Caching for Java Mobile Clients
Web services are becoming more and more pervasive and are used by a number of information system clients. However, mobile clients still have limited computing and network resource...
Alexandru Caracas, Iulia Ion, Mihaela Ion
101
Voted
CP
2007
Springer
15 years 6 months ago
Propagation = Lazy Clause Generation
Finite domain propagation solvers effectively represent the possible values of variables by a set of choices which can be naturally modelled as Boolean variables. In this paper we...
Olga Ohrimenko, Peter J. Stuckey, Michael Codish