Sciweavers

1532 search results - page 79 / 307
» A Comparison of RESTART Implementations
Sort
View
ICS
2004
Tsinghua U.
15 years 9 months ago
Adaptive incremental checkpointing for massively parallel systems
Given the scale of massively parallel systems, occurrence of faults is no longer an exception but a regular event. Periodic checkpointing is becoming increasingly important in the...
Saurabh Agarwal, Rahul Garg, Meeta Sharma Gupta, J...
139
Voted
CIDR
2009
167views Algorithms» more  CIDR 2009»
15 years 4 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
ITCC
2005
IEEE
15 years 9 months ago
A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor
In many applications a software implementation of ECC (Elliptic Curve Cryptography) might be inappropriate due to performance requirements, therefore hardware implementations are ...
Fabio Sozzani, Guido Bertoni, Stefano Turcato, Luc...
119
Voted
CASC
2007
Springer
112views Mathematics» more  CASC 2007»
15 years 9 months ago
Polynomial Division Using Dynamic Arrays, Heaps, and Packed Exponent Vectors
A common way of implementing multivariate polynomial multiplication and division is to represent polynomials as linked lists of terms sorted in a term ordering and to use repeated ...
Michael B. Monagan, Roman Pearce
114
Voted
IJCV
2007
113views more  IJCV 2007»
15 years 3 months ago
Boosting Sex Identification Performance
This paper presents a method based on AdaBoost to identify the sex of a person from a low resolution grayscale picture of their face. The method described here is implemented in a...
Shumeet Baluja, Henry A. Rowley