Sciweavers

1968 search results - page 174 / 394
» The Complexity of Valued Constraint Models
Sort
View
101
Voted
IPPS
2006
IEEE
15 years 8 months ago
Automatic application-specific microarchitecture reconfiguration
Applications for constrained embedded systems are subject to strict time constraints and restrictive resource utilization. With soft core processors, application developers can cu...
Shobana Padmanabhan, Ron K. Cytron, Roger D. Chamb...
SAC
2005
ACM
15 years 7 months ago
Limited assignments: a new cutoff strategy for incomplete depth-first search
In this paper, we propose an extension of three incomplete depthfirst search techniques, namely depth-bounded backtrack search, credit search, and iterative broadening, towards pr...
Roman Barták, Hana Rudová
83
Voted
EMO
2005
Springer
76views Optimization» more  EMO 2005»
15 years 7 months ago
Photonic Device Design Using Multiobjective Evolutionary Algorithms
Abstract. The optimization and design of two different types of photonic devices - a Fibre Bragg Grating and a Microstructured Polymer Optical Fibre is presented in light of multi...
Steven Manos, Leon Poladian, Peter J. Bentley, Mar...
120
Voted
ATAL
2004
Springer
15 years 7 months ago
The Advantages of Compromising in Coalition Formation with Incomplete Information
This paper presents protocols and strategies for coalition formation with incomplete information under time constraints. It focuses on strategies for coalition members to distribu...
Sarit Kraus, Onn Shehory, Gilad Taase
104
Voted
HIPC
2004
Springer
15 years 7 months ago
A Shared Memory Dispatching Approach for Partially Clairvoyant Schedulers
It is well known that in a typical real-time system, certain parameters, such as the execution time of a job, are not fixed numbers. In such systems, it is common to characterize ...
K. Subramani, Kiran Yellajyosula