Sciweavers

672 search results - page 98 / 135
» Words and forbidden factors
Sort
View
SIAMJO
2008
114views more  SIAMJO 2008»
14 years 11 months ago
An Inexact SQP Method for Equality Constrained Optimization
We present an algorithm for large-scale equality constrained optimization. The method is based on a characterization of inexact sequential quadratic programming (SQP) steps that ca...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
ALGORITHMICA
2005
84views more  ALGORITHMICA 2005»
14 years 11 months ago
Optimal Read-Once Parallel Disk Scheduling
An optimal prefetching and I/O scheduling algorithm L-OPT, for parallel I/O systems, using a read-once model of block references is presented. The algorithm uses knowledge of the n...
Mahesh Kallahalla, Peter J. Varman
TCOM
2008
68views more  TCOM 2008»
14 years 11 months ago
Analysis and design of book-ahead bandwidth-sharing mechanisms
In this article, we present a novel discrete-time Markov chain model of book-ahead bandwidthsharing mechanisms. We use this analytical model and a simulation model to understand t...
Xiangfei Zhu, Malathi Veeraraghavan
TCS
2008
14 years 11 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
JTAER
2007
125views more  JTAER 2007»
14 years 11 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...