Sciweavers

1968 search results - page 314 / 394
» The Complexity of Valued Constraint Models
Sort
View
GLVLSI
2010
IEEE
172views VLSI» more  GLVLSI 2010»
15 years 3 months ago
Online convex optimization-based algorithm for thermal management of MPSoCs
Meeting the temperature constraints and reducing the hot-spots are critical for achieving reliable and efficient operation of complex multi-core systems. The goal of thermal mana...
Francesco Zanini, David Atienza, Giovanni De Miche...
DSD
2009
IEEE
144views Hardware» more  DSD 2009»
15 years 4 months ago
Composable Resource Sharing Based on Latency-Rate Servers
Abstract—Verification of application requirements is becoming a bottleneck in system-on-chip design, as the number of applications grows. Traditionally, the verification comple...
Benny Akesson, Andreas Hansson, Kees Goossens
COMSWARE
2007
IEEE
15 years 4 months ago
On Optimal Performance in Mobile Ad hoc Networks
In this paper we are concerned with finding the maximum throughput that a mobile ad hoc network can support. Even when nodes are stationary, the problem of determining the capaci...
Tapas K. Patra, Joy Kuri, Pavan Nuggehalli
BMCBI
2010
171views more  BMCBI 2010»
14 years 10 months ago
PyMix - The Python mixture package - a tool for clustering of heterogeneous biological data
Background: Cluster analysis is an important technique for the exploratory analysis of biological data. Such data is often high-dimensional, inherently noisy and contains outliers...
Benjamin Georgi, Ivan Gesteira Costa, Alexander Sc...
IFIP
2010
Springer
14 years 4 months ago
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
Abstract. This paper extends existing models for collaborative systems. We investigate how much damage can be done by insiders alone, without collusion with an outside adversary. I...
Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, ...