Team for Research in
Ubiquitous Secure Technology

Heuristics Considered Harmful: Using Mathematical Optimization for Resource Management in Distributed Systems
Emin Gun Sirer

Citation
Emin Gun Sirer. "Heuristics Considered Harmful: Using Mathematical Optimization for Resource Management in Distributed Systems". IEEE Intelligent Systems, Special Issue on Self-Management through Self-Organization in Information Systems, pp. 55-57, April 2006.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Emin Gun Sirer. <a
    href="http://www.truststc.org/pubs/39.html"
    >Heuristics Considered Harmful: Using Mathematical
    Optimization for Resource Management in Distributed
    Systems</a>, <i>IEEE Intelligent Systems,
    Special Issue on Self-Management through Self-Organization
    in Information Systems</i>, pp. 55-57, April 2006.
  • Plain text
    Emin Gun Sirer. "Heuristics Considered Harmful: Using
    Mathematical Optimization for Resource Management in
    Distributed Systems". <i>IEEE Intelligent
    Systems, Special Issue on Self-Management through
    Self-Organization in Information Systems</i>, pp.
    55-57, April 2006.
  • BibTeX
    @article{Sirer06_HeuristicsConsideredHarmfulUsingMathematicalOptimization,
        author = {Emin Gun Sirer},
        title = {Heuristics Considered Harmful: Using Mathematical
                  Optimization for Resource Management in
                  Distributed Systems},
        journal = {IEEE Intelligent Systems, Special Issue on
                  Self-Management through Self-Organization in
                  Information Systems},
        pages = {55-57},
        month = {April},
        year = {2006},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/39.html}
    }
    

Posted by Bill Hogan on 4 Apr 2006.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.