Sciweavers

6514 search results - page 1008 / 1303
» Low-Knowledge Algorithm Control
Sort
View
ICC
1997
IEEE
158views Communications» more  ICC 1997»
15 years 7 months ago
The Priority Token Bank in a Network of Queues
This paper takes a known approach for scheduling and admission control in integrated services networks1 , the Priority Token Bank (PTB), whose mechanism and performance have been ...
Mark A. Lynn, Jon M. Peha
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 7 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
INFOCOM
1996
IEEE
15 years 7 months ago
A Reliable, Adaptive Network Protocol for Video Transport
In thispaper, we present anadaptive networklayer protocol for VBR video transport. It: (1) minimizes buffer requirement in the network whileguaranteeingthat packets of VBR encoded...
Pawan Goyal, Harrick M. Vin, Chia Shen, Prashant J...
LCPC
1997
Springer
15 years 7 months ago
Automatic Data Decomposition for Message-Passing Machines
The data distribution problem is very complex, because it involves trade-offdecisions between minimizing communication and maximizing parallelism. A common approach towards solving...
Mirela Damian-Iordache, Sriram V. Pemmaraju
TAPSOFT
1997
Springer
15 years 7 months ago
Set Operations for Recurrent Term Schematizations
Abstract. Reasoning on programs and automated deduction often require the manipulation of in nite sets of objects. Many formalisms have been proposed to handle such sets. Here we d...
Ali Amaniss, Miki Hermann, Denis Lugiez
« Prev « First page 1008 / 1303 Last » Next »