Sciweavers

2125 search results - page 424 / 425
» Points with Type-2 Operations
Sort
View
SAC
2011
ACM
12 years 8 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
12 years 8 months ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...
HUC
2011
Springer
12 years 4 months ago
LightWave: using compact fluorescent lights as sensors
In this paper, we describe LightWave, a sensing approach that turns ordinary compact fluorescent light (CFL) bulbs into sensors of human proximity. Unmodified CFL bulbs are shown ...
Sidhant Gupta, Ke-Yu Chen, Matthew S. Reynolds, Sh...
CVPR
2012
IEEE
11 years 7 months ago
Video segmentation by tracing discontinuities in a trajectory embedding
Our goal is to segment a video sequence into moving objects and the world scene. In recent work, spectral embedding of point trajectories based on 2D motion cues accumulated from ...
Katerina Fragkiadaki, Geng Zhang, Jianbo Shi
ICDCS
2012
IEEE
11 years 7 months ago
Combining Partial Redundancy and Checkpointing for HPC
Today’s largest High Performance Computing (HPC) systems exceed one Petaflops (1015 floating point operations per second) and exascale systems are projected within seven years...
James Elliott, Kishor Kharbas, David Fiala, Frank ...