Sciweavers

35 search results - page 6 / 7
» Uniformly bounded duplication codes
Sort
View
TCOM
2010
220views more  TCOM 2010»
13 years 4 months ago
Fiber fault PON monitoring using optical coding: Effects of customer geographic distribution
Abstract—We analyze the performance of fiber fault monitoring of a PON using a centralized, passive optical coding (OC) system. We develop an expression for the detected monitor...
Mohammad M. Rad, Habib Fathallah, Leslie A. Rusch
ESA
2004
Springer
96views Algorithms» more  ESA 2004»
13 years 11 months ago
An Experimental Study of Random Knapsack Problems
The size of the Pareto curve for the bicriteria version of the knapsack problem is polynomial on average. This has been shown for various random input distributions. We experimenta...
René Beier, Berthold Vöcking
ECOOP
2000
Springer
13 years 10 months ago
Jam - A Smooth Extension of Java with Mixins
Abstract. In this paper we present Jam, an extension of the Java language supporting mixins, that is, parametric heir classes. A mixin declaration in Jam is similar to a Java heir ...
Davide Ancona, Giovanni Lagorio, Elena Zucca
SDM
2012
SIAM
281views Data Mining» more  SDM 2012»
11 years 8 months ago
Contextual Collaborative Filtering via Hierarchical Matrix Factorization
Matrix factorization (MF) has been demonstrated to be one of the most competitive techniques for collaborative filtering. However, state-of-the-art MFs do not consider contextual...
ErHeng Zhong, Wei Fan, Qiang Yang
IWMM
2010
Springer
211views Hardware» more  IWMM 2010»
13 years 7 months ago
Concurrent, parallel, real-time garbage-collection
With the current developments in CPU implementations, it becomes obvious that ever more parallel multicore systems will be used even in embedded controllers that require real-time...
Fridtjof Siebert