Sciweavers

804 search results - page 39 / 161
» On the Termination of the Chase Algorithm
Sort
View
103
Voted
PPOPP
2009
ACM
16 years 1 months ago
Idempotent work stealing
Load balancing is a technique which allows efficient parallelization of irregular workloads, and a key component of many applications and parallelizing runtimes. Work-stealing is ...
Maged M. Michael, Martin T. Vechev, Vijay A. Saras...
88
Voted
IMR
2004
Springer
15 years 5 months ago
Inverse Pre-Deformation of Finite Element Mesh for Large Deformation Analysis
In the finite element analysis that deals with large deformation, the process usually produces distorted elements at the later stages of the analysis. These distorted elements lea...
Arbtip Dheeravongkit, Kenji Shimada
95
Voted
AAAI
2011
14 years 14 days ago
The Steiner Multigraph Problem: Wildlife Corridor Design for Multiple Species
The conservation of wildlife corridors between existing habitat preserves is important for combating the effects of habitat loss and fragmentation facing species of concern. We in...
Katherine J. Lai, Carla P. Gomes, Michael K. Schwa...
124
Voted
ICARIS
2005
Springer
15 years 6 months ago
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired by the negative selection immune system principle. The algorithm was proposed t...
Thomas Stibor, Jonathan Timmis, Claudia Eckert
114
Voted
STOC
2007
ACM
92views Algorithms» more  STOC 2007»
16 years 23 days ago
Tight bounds for asynchronous randomized consensus
A distributed consensus algorithm allows n processes to reach a common decision value starting from individual inputs. Wait-free consensus, in which a process always terminates wi...
Hagit Attiya, Keren Censor