Sciweavers

790 search results - page 115 / 158
» Limits of Work-Stealing Scheduling
Sort
View
DAC
2002
ACM
16 years 1 months ago
Watermarking integer linear programming solutions
Linear programming (LP) in its many forms has proven to be an indispensable tool for expressing and solving optimization problems in numerous domains. We propose the first set of ...
Seapahn Megerian, Milenko Drinic, Miodrag Potkonja...
100
Voted
DAC
2005
ACM
16 years 1 months ago
An effective power mode transition technique in MTCMOS circuits
- The large magnitude of supply/ground bounces, which arise from power mode transitions in power gating structures, may cause spurious transitions in a circuit. This can result in ...
Afshin Abdollahi, Farzan Fallah, Massoud Pedram
76
Voted
CHI
2008
ACM
16 years 29 days ago
SuperBreak: using interactivity to enhance ergonomic typing breaks
Repetitive strain injuries and ergonomics concerns have become increasingly significant health issues as a growing number of individuals frequently use computers for long periods ...
Dan Morris, A. J. Bernheim Brush, Brian Meyers
OSDI
2008
ACM
16 years 25 days ago
Predicting Computer System Failures Using Support Vector Machines
Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure...
Errin W. Fulp, Glenn A. Fink, Jereme N. Haack
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
15 years 9 months ago
System-wide energy minimization for real-time tasks: lower bound and approximation
We present a dynamic voltage scaling (DVS) technique that minimizes system-wide energy consumption for both periodic and sporadic tasks. It is known that a system consists of proc...
Xiliang Zhong, Cheng-Zhong Xu