Sciweavers

790 search results - page 64 / 158
» Limits of Work-Stealing Scheduling
Sort
View
ICC
2000
IEEE
153views Communications» more  ICC 2000»
15 years 5 months ago
Collision-Avoidance Transmission Scheduling for Ad-Hoc Networks
Abstract— A novel multichannel schedule-based Medium Access Control (MAC) protocol for ad-hoc networks, named collision-avoidance transmission scheduling (CATS) is introduced. CA...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
88
Voted
RTSS
1999
IEEE
15 years 4 months ago
Timing Anomalies in Dynamically Scheduled Microprocessors
Previous timing analysis methods have assumed that the worst-case instruction execution time necessarily corresponds to the worst-case behavior. We show that this assumption is wr...
Thomas Lundqvist, Per Stenström
ESA
2008
Springer
195views Algorithms» more  ESA 2008»
15 years 2 months ago
A Characterization of 2-Player Mechanisms for Scheduling
We study the mechanism design problem of scheduling unrelated machines and we completely characterize the decisive truthful mechanisms for two players when the domain contains bot...
George Christodoulou, Elias Koutsoupias, Angelina ...
104
Voted
MASCOTS
2003
15 years 2 months ago
Zone-Based Shortest Positioning Time First Scheduling for MEMS-Based Storage Devices
Access latency to secondary storage devices is frequently a limiting factor in computer system performance. New storage technologies promise to provide greater storage densities a...
Bo Hong, Scott A. Brandt, Darrell D. E. Long, Etha...
82
Voted
AIPS
1994
15 years 1 months ago
Toward a Plan Steering Agent: Experiments with Schedule Maintenance
When a plan involves hundreds or thousands of events over time it can be di cult or impossible to tell whether those events are unfolding \according to plan" and to assess th...
Tim Oates, Paul R. Cohen