Sciweavers

2652 search results - page 357 / 531
» Privacy-preserving linear programming
Sort
View
CPAIOR
2007
Springer
15 years 9 months ago
A Column Generation Based Destructive Lower Bound for Resource Constrained Project Scheduling Problems
In this paper we present a destructive lower bound for a number of resource constrained project scheduling (RCPS) problems, which is based on column generation. We first look at t...
J. M. van den Akker, Guido Diepen, J. A. Hoogeveen
CASES
2006
ACM
15 years 9 months ago
A dynamic code placement technique for scratchpad memory using postpass optimization
In this paper, we propose a fully automatic dynamic scratchpad memory (SPM) management technique for instructions. Our technique loads required code segments into the SPM on deman...
Bernhard Egger, Chihun Kim, Choonki Jang, Yoonsung...
BROADNETS
2005
IEEE
15 years 8 months ago
Network design for IP-centric light trail networks
Abstract— We explore network design principles for nextgeneration all-optical wide-area networks, employing light-trail technology. Light-trail [1] is a light-wave circuit that a...
Srivatsan Balasubramanian, Ahmed E. Kamal, Arun K....
CODES
2005
IEEE
15 years 8 months ago
Satisfying real-time constraints with custom instructions
Instruction-set extensible processors allow an existing processor core to be extended with application-specific custom instructions. In this paper, we explore a novel application...
Pan Yu, Tulika Mitra
CSB
2005
IEEE
145views Bioinformatics» more  CSB 2005»
15 years 8 months ago
Classification Methods for HIV-1 Medicated Neuronal Damage
HIV-1-associated dementia (HAD) is the most devastating disease happened in the central nervous system of AIDS patients. Neuronal damage, the early indicator of HAD, under differe...
Mengjun Wang, Jialin Zheng, Zhengxin Chen, Yong Sh...