Sciweavers

628 search results - page 82 / 126
» Scheduling Algorithm with Potential Behaviors
Sort
View
DSOM
2003
Springer
15 years 5 months ago
An Epidemic Protocol for Managing Routing Tables in Very Large Peer-to-Peer Networks
Building self-maintained overlay networks for message routing has recently attracted significant research interest [5–9]. All suggested solutions have a common goal: To build an...
Spyros Voulgaris, Maarten van Steen
ACSD
1998
IEEE
90views Hardware» more  ACSD 1998»
15 years 4 months ago
Verification of Pipelined Microprocessors by Correspondence Checking in Symbolic Ternary Simulation
This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory shadowing, an extension of Burch and Dill's pipeline verification method [...
Miroslav N. Velev, Randal E. Bryant
DAC
2010
ACM
15 years 1 months ago
Network on chip design and optimization using specialized influence models
In this study, we propose the use of specialized influence models to capture the dynamic behavior of a Network-onChip (NoC). Our goal is to construct a versatile modeling framewor...
Cristinel Ababei
IJCAI
1989
15 years 1 months ago
Unrestricted And-Parallel Execution of Logic Programs with Dependency Directed Backtracking
A model of unrestricted And-parallel execution for logic programs is described, based on Dependency Directed Backtracking (DDBT) aimed at improving the efficiency of execution whi...
Nikos Drakos
NAACL
2010
14 years 9 months ago
Not All Seeds Are Equal: Measuring the Quality of Text Mining Seeds
Open-class semantic lexicon induction is of great interest for current knowledge harvesting algorithms. We propose a general framework that uses patterns in bootstrapping fashion ...
Zornitsa Kozareva, Eduard H. Hovy