Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,329,642 papers from all fields of science
Search
Sign In
Create Free Account
Scheduling (computing)
Known as:
Task scheduler
, Non-deterministic Scheduling
, Deterministic Scheduling
Expand
In computing, scheduling is the method by which work specified by some means is assigned to resources that complete the work. The work may be virtual…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
Background Intelligent Transfer Service
Blocking (computing)
Client–server model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Comparison of open-source cloud management platforms: OpenStack and OpenNebula
Xiaolong Wen
,
Genqiang Gu
,
Qingchun Li
,
Yun Gao
,
Xuejie Zhang
International Conference on Fuzzy Systems and…
2012
Corpus ID: 20703511
Cloud management platforms may manage the resources provided by the infrastructure as a service (IaaS) cloud. With the rapid…
Expand
Highly Cited
2012
Highly Cited
2012
Wireless information transfer with opportunistic energy harvesting
Liang Liu
,
Rui Zhang
,
K. Chua
IEEE International Symposium on Information…
2012
Corpus ID: 43885603
Energy harvesting is a promising solution to prolong the operation of energy-constrained wireless networks. In particular…
Expand
Highly Cited
2010
Highly Cited
2010
Jena Research Papers in Business and Economics Optimally Routing and Scheduling Tow Trains for JIT-Supply of Mixed-Model Assembly Lines
N. Boysen
2010
Corpus ID: 14264961
In recent years, more and more automobile producers adopted the supermarketconcept to enable a exible and reliable Just-in-Time…
Expand
Highly Cited
2010
Highly Cited
2010
Fixed-Priority Multiprocessor Scheduling with Liu and Layland's Utilization Bound
Nan Guan
,
Martin Stigge
,
W. Yi
,
Ge Yu
16th IEEE Real-Time and Embedded Technology and…
2010
Corpus ID: 1599561
Liu and Layland discovered the famous utilization bound for fixed-priority scheduling on single processor systems in the 1970's…
Expand
Highly Cited
2010
Highly Cited
2010
A constant-factor approximation for wireless capacity maximization with power control in the SINR model
Thomas Kesselheim
ACM-SIAM Symposium on Discrete Algorithms
2010
Corpus ID: 10050921
In modern wireless networks devices are able to set the power for each transmission carried out. Experimental but also…
Expand
Highly Cited
2006
Highly Cited
2006
FHCF: A Simple and Efficient Scheduling Scheme for IEEE 802.11e Wireless LAN
Pierre Ansel
,
Q. Ni
,
T. Turletti
Mob. Networks Appl.
2006
Corpus ID: 1999404
The IEEE 802.11e medium access control (MAC) layer protocol is an emerging standard to support quality of service (QoS) in 802.11…
Expand
Highly Cited
2004
Highly Cited
2004
A novel decentralized ethernet-based PON access architecture for provisioning differentiated QoS
S. Sherif
,
A. Hadjiantonis
,
G. Ellinas
,
C. Assi
,
Mohamed A. Ali
Journal of Lightwave Technology
2004
Corpus ID: 24136248
To date, the mainstream ethernet passive optical network (EPON) bandwidth allocation schemes as well as the new IEEE 802.3ah…
Expand
Highly Cited
2003
Highly Cited
2003
RTOS modeling for system level design
A. Gerstlauer
,
Haobo Yu
,
D. Gajski
Design, Automation and Test in Europe Conference…
2003
Corpus ID: 15638
System level synthesis is widely seen as the solution for closing the productivity gap in system design. High level system models…
Expand
Highly Cited
1997
Highly Cited
1997
Quality-of-service-oriented medium access control for wireless ATM networks
N. Passas
,
S. Paskalis
,
D. Vali
,
L. Merakos
IEEE Communications Magazine
1997
Corpus ID: 2200121
The medium access control (MAC) protocol and the underlying traffic scheduling algorithm developed within project Magic WAND…
Expand
Highly Cited
1964
Highly Cited
1964
On Scheduling Problems with Deferral Costs
E. Lawler
1964
Corpus ID: 62716184
A class of scheduling problems involving deferral costs has been formulated by McNaughton, who has described a simple method of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE