Sciweavers

790 search results - page 154 / 158
» Limits of Work-Stealing Scheduling
Sort
View
101
Voted
CASES
2005
ACM
15 years 6 days ago
Exploiting pipelining to relax register-file port constraints of instruction-set extensions
Customisable embedded processors are becoming available on the market, thus making it possible for designers to speed up execution of applications by using Application-specific F...
Laura Pozzi, Paolo Ienne
106
Voted
CVDB
2005
ACM
15 years 6 days ago
Optimizing progressive query-by-example over pre-clustered large image databases
The typical mode for querying in an image content-based information system is query-by-example, which allows the user to provide an image as a query and to search for similar imag...
Anicet Kouomou Choupo, Laure Berti-Equille, Annie ...
71
Voted
ACE
2004
182views Education» more  ACE 2004»
14 years 11 months ago
Facilitating Successful Online Computing Courses While Minimising Extra Tutor Workload
A key problem in facilitating a successful online course is the highly time -consuming nature of the administrative and pedagogical tasks involved. It is also difficult to achieve...
Stuart Young, Mae McSporran
108
Voted
AVI
2006
14 years 11 months ago
Mobility agents: guiding and tracking public transportation users
Increasingly, public transportation systems are equipped with Global Positioning Systems (GPS) connected to control centers through wireless networks. Controllers use this infrast...
Alexander Repenning, Andri Ioannidou
101
Voted
UAI
2003
14 years 11 months ago
Marginalizing Out Future Passengers in Group Elevator Control
Group elevator scheduling is an NP-hard sequential decision-making problem with unbounded state spaces and substantial uncertainty. Decision-theoretic reasoning plays a surprising...
Daniel Nikovski, Matthew Brand