Sciweavers

1664 search results - page 142 / 333
» Making a Case for Multi-Agent Systems
Sort
View
156
Voted
COOP
2004
15 years 6 months ago
Model Checking Groupware Protocols
Abstract. The enormous improvements in the efficiency of model-checking techniques in recent years facilitates their application to ever more complex systems of concurrent and dist...
Maurice H. ter Beek, Mieke Massink, Diego Latella,...
132
Voted
RTAS
2002
IEEE
15 years 9 months ago
The Aperiodic Multiprocessor Utilization Bound for Liquid Tasks
Real-time scheduling theory has developed powerful tools for translating conditions on aggregate system utilization into per-task schedulability guarantees. The main breakthrough ...
Tarek F. Abdelzaher, Björn Andersson, Jan Jon...
CASES
2007
ACM
15 years 8 months ago
Non-transparent debugging for software-pipelined loops
This paper tackles the problem of providing correct information about program variable values in a software-pipelined loop through a non-transparent debugging approach. Since mode...
Hugo Venturini, Frédéric Riss, Jean-...
132
Voted
CASES
2008
ACM
15 years 6 months ago
Execution context optimization for disk energy
Power, energy, and thermal concerns have constrained embedded systems designs. Computing capability and storage density have increased dramatically, enabling the emergence of hand...
Jerry Hom, Ulrich Kremer
ATAL
2006
Springer
15 years 8 months ago
Monotonic concession protocols for multilateral negotiation
The most natural way of thinking about negotiation is probably a situation whereby each of the parties involved initially make a proposal that is particularly beneficial to themse...
Ulle Endriss