Sciweavers

5329 search results - page 883 / 1066
» The Weighted Majority Algorithm
Sort
View
DFT
2000
IEEE
119views VLSI» more  DFT 2000»
15 years 8 months ago
An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications
1 Over the last years, an increasing number of safety-critical tasks have been demanded to computer systems. In particular, safety-critical computer-based applications are hitting ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
152
Voted
ICNP
2000
IEEE
15 years 8 months ago
Optimal Partitioning of Multicast Receivers
Multicast sessions may have a large number of receivers with heterogeneous reception capacities. To accommodate this heterogeneity, various multi-rate schemes, based upon the use ...
Yang Richard Yang, Min Sik Kim, Simon S. Lam
INFOCOM
2000
IEEE
15 years 8 months ago
A Measurement-Based Admission-Controlled Web Server
Current HTTP servers process requests using a first come first serve queuing policy. What this implies is that the web server must process each request as it arrives. The result is...
Kelvin Li, Sugih Jamin
MOBICOM
2000
ACM
15 years 8 months ago
A scalable low-latency cache invalidation strategy for mobile environments
—Caching frequently accessed data items on the client side is an effective technique for improving performance in a mobile environment. Classical cache invalidation strategies ar...
Guohong Cao
147
Voted
SC
2000
ACM
15 years 8 months ago
A Comparison of Three Programming Models for Adaptive Applications on the Origin2000
Adaptive applications have computational workloads and communication patterns which change unpredictably at runtime, requiring dynamic load balancing to achieve scalable performan...
Hongzhang Shan, Jaswinder Pal Singh, Leonid Oliker...