Sciweavers

790 search results - page 84 / 158
» Limits of Work-Stealing Scheduling
Sort
View
113
Voted
IROS
2006
IEEE
97views Robotics» more  IROS 2006»
15 years 6 months ago
A New Method of Force Control for Unknown Environments
–We propose a new control technique for force control on unknown environments. In particular, the proposed approach overcomes the need for precise estimation of environment param...
Vishnu Mallapragada, Duygun Erol, Nilanjan Sarkar
ICMCS
2005
IEEE
97views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Playback Delay Optimization in Scalable Video Streaming
This paper addresses the problem of optimizing the playback delay experienced by a population of heterogeneous clients, in video streaming applications. We consider a typical broa...
Jean-Paul Wagner, Pascal Frossard
HPDC
2003
IEEE
15 years 6 months ago
Trace-Based Simulations of Processor Co-Allocation Policies in Multiclusters
In systems consisting of multiple clusters of processors which employ space sharing for scheduling jobs, such as our Distributed ASCI1 Supercomputer (DAS), coallocation, i.e., the...
Anca I. D. Bucur, Dick H. J. Epema
95
Voted
INFOCOM
2003
IEEE
15 years 6 months ago
Optimal Energy Allocation for Delay-Constrained Data Transmission over a Time-Varying Channel
— We seek to maximize the data throughput of an energy and time constrained transmitter sending data over a fading channel. The transmitter has a fixed amount of energy and a li...
Alvin Fu, Eytan Modiano, John N. Tsitsiklis
78
Voted
INFOCOM
2003
IEEE
15 years 6 months ago
Core-stateless Guaranteed Throughput Networks
— End-to-end throughput guarantee is an important service semantics that network providers would like to offer to their customers. A network provider can offer such service seman...
Jasleen Kaur, Harrick M. Vin