Sciweavers

1161 search results - page 190 / 233
» Resource Modeling for Timed Creol Models
Sort
View
147
Voted
VLSID
2006
IEEE
192views VLSI» more  VLSID 2006»
15 years 9 months ago
Beyond RTL: Advanced Digital System Design
This tutorial focuses on advanced techniques to cope with the complexity of designing modern digital chips which are complete systems often containing multiple processors, complex...
Shiv Tasker, Rishiyur S. Nikhil
INFOCOM
2005
IEEE
15 years 9 months ago
Gossip algorithms: design, analysis and applications
Abstract— Motivated by applications to sensor, peer-topeer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and...
Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, D...
124
Voted
STOC
1999
ACM
106views Algorithms» more  STOC 1999»
15 years 7 months ago
Scheduling in the Dark
We considered non-clairvoyant multiprocessor scheduling of jobs with arbitrary arrival times and changing execution characteristics. The problem has been studied extensively when ...
Jeff Edmonds
144
Voted
TOCS
2008
154views more  TOCS 2008»
15 years 3 months ago
Adaptive work-stealing with parallelism feedback
We present an adaptive work-stealing thread scheduler, ASTEAL, for fork-join multithreaded jobs, like those written using the Cilk multithreaded language or the Hood work-stealing...
Kunal Agrawal, Charles E. Leiserson, Yuxiong He, W...
INFOCOM
2010
IEEE
15 years 1 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman