Sciweavers

790 search results - page 128 / 158
» Limits of Work-Stealing Scheduling
Sort
View
123
Voted
ICDCS
1995
IEEE
15 years 4 months ago
Parallel Processing on Networks of Workstations: A Fault-Tolerant, High Performance Approach
One of the mostsoughtaftersoftware innovation of thisdecade is the construction of systems using off-the-shelf workstations that actually deliver, and even surpass, the power and ...
Partha Dasgupta, Zvi M. Kedem, Michael O. Rabin
100
Voted
FAST
2008
15 years 2 months ago
The RAID-6 Liberation Codes
The RAID-6 specification calls for a storage system with multiple storage devices to tolerate the failure of any two devices. Numerous erasure coding techniques have been develope...
James S. Plank
108
Voted
WSC
2008
15 years 2 months ago
C-5 Isochronal inspection process modeling
United States Air Mobility Command (AMC) has a limited number of C-5 aircraft, and so opportunities to either preserve or increase aircraft availability are of interest to them. I...
Alan W. Johnson, Charles Glasscock, Adam Little, M...
WSC
2008
15 years 2 months ago
Speeding up call center simulation and optimization by Markov chain uniformization
Staffing and scheduling optimization in large multiskill call centers is time-consuming, mainly because it requires lengthy simulations to evaluate performance measures and their ...
Eric Buist, Wyean Chan, Pierre L'Ecuyer
ATAL
2008
Springer
15 years 2 months ago
Controlling deliberation in a Markov decision process-based agent
Meta-level control manages the allocation of limited resources to deliberative actions. This paper discusses efforts in adding meta-level control capabilities to a Markov Decision...
George Alexander, Anita Raja, David J. Musliner