نتایج جستجو برای: resource usage

تعداد نتایج: 301794  

1999
V. Janaki Ramanan R. Govindarajan

In this paper we propose two optimization techniques for resource modelling in software pipelining. The first technique is the extension of our grouping technique to reduce the space overhead in automaton based software pipelining methods. This technique exploits the symmetry in the states of the automaton to produce the Group Automaton (GA) with reduced number of states. Our second technique i...

2012
Pierpaolo Degano Gian Luigi Ferrari Gianluca Mezzetti

Two classes of nominal automata, namely Usage Automata (UAs) and Variable Finite Automata (VFAs) are considered to express resource control policies over program execution traces expressed by a nominal calculus (Usages). We first analyse closure properties of UAs, and then show UAs less expressive than VFAs. We finally carry over to VFAs the symbolic technique for model checking Usages against ...

Journal: :ERCIM News 2007
Ivan B. Vermeulen Sander M. Bohte Han La Poutré

During development of the MUDR EHR and MDMC, which was supported by the 1ET200300413 project of the AS CR, the UMLS Knowledge Source Server was used to evaluate the applicability of international nomenclatures in the Czech medical terminology. During the analysis we found that approximately 85% of MDMC concepts are included in at least one classification system. More than 50% are included in SN...

2009
D. R. Mani Andrew Betz James Drew

A structural conflict exists in businesses that sell services whose production costs are discontinuous and whose consumption is continuous but variable. A classic example is in businesses where capital-intensive infrastructure is necessary for provisioning service, but the capacity resulting from capital outlay is not always fully and efficiently utilized. Marketing departments focus on initiat...

2008
Jorge Navas Mario Méndez-Lojo Manuel V. Hermenegildo

Automatic cost analysis of programs has been traditionally studied in terms of a number of concrete, predefined resources such as execution steps, time, or memory. However, the increasing relevance of analysis applications such as static debugging and/or certification of user-level properties (including for mobile code) makes it interesting to develop analyses for resource notions that are actu...

1998
Nirav H. Kapadia Carla E. Brodley Mark S. Lundstrom

This paper reports on an application of artiicial intelligence to achieve demand-based scheduling within the context of a network-computing infrastructure. The described AI system uses tool-speciic, run-time input to predict the resource-usage characteristics of runs. Instance-based learning with locally weighted polynomial regression is employed because of the need to simultaneously learn mult...

2014
Sakuntala S. Pillai

Resource allocation is one of the major considerations in efficient usage of a wireless network. Emergence of new computing/ communication platforms have resulted in usage of such technologies for applications such as mobile gaming, video conferencing etc; these trends in turn places greater demand on symmetrical quality. Existing literature mainly focuses on resource allocation for uplink and ...

1995
Theodore W. Leung

Query facilities in object-oriented databases lag behind their relational counterparts in performance. This paper identifies important sources of that performance difference, the random I/O problem and the re-reading problem. We propose three techniques for improving the execution of object-oriented database queries: reuse/out of order execution, memoization, and buffer replacement policy. Sche...

2007
Vijayant Dhankhar Saket Kaushik Duminda Wijesekera

The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesses to globally resources. We do so by enhancing the policy execution framework with locks.

2007
Josep Sanjuàs-Cuxart Pere Barlet-Ros

Building robust network monitoring applications is hard given the unpredictable nature of network traffic and high, ever-increasing data rates. Traffic analysis systems must be designed with load shedding techniques in mind that can reduce the workload of a network monitoring system whilst gracefully degrading the accuracy of the results. We present a novel load shedding approach based on build...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید