Sciweavers

790 search results - page 93 / 158
» Limits of Work-Stealing Scheduling
Sort
View
WWW
2010
ACM
15 years 7 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
130
Voted
ICAI
2003
15 years 2 months ago
A Quantitative Model of Capabilities in Multi-Agent Systems
Reasoning about capabilities in multi-agent systems is crucial for many applications. There are two aspects of reasoning about the capabilities of an agent to achieve its goals. O...
Linli He, Thomas R. Ioerger
ICIP
2006
IEEE
16 years 2 months ago
Congestion-Distortion Optimized Peer-to-Peer Video Streaming
In live peer-to-peer streaming, a video stream is transmitted to a large population of viewers, through the use of the uplink bandwidth of participating peers. This approach overc...
Eric Setton, Jeonghun Noh, Bernd Girod
ISCAS
2005
IEEE
155views Hardware» more  ISCAS 2005»
15 years 6 months ago
Hyperblock formation: a power/energy perspective for high performance VLIW architectures
— Architectures based on Very Long Instruction Word (VLIW) processors are an optimal choice in the attempt to obtain high performance levels in mobile devices. The effectiveness ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
AUTONOMICS
2007
ACM
15 years 2 months ago
Multi-hop broadcast from theory to reality: practical design for ad hoc networks
We propose a complete design for a scope limited, multihop broadcast middleware, which is adapted to the variability of the ad-hoc environment and works in unlimited ad-hoc networ...
Alaeddine El Fawal, Jean-Yves Le Boudec, Kav&eacut...