Sciweavers

683 search results - page 120 / 137
» A Fine-grained Analysis of a Simple Independent Set Algorith...
Sort
View
139
Voted
IEEEPACT
2008
IEEE
15 years 10 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
SIBGRAPI
2008
IEEE
15 years 10 months ago
Structural Matching of 2D Electrophoresis Gels using Graph Models
2D electrophoresis is a well known method for protein separation which is extremely useful in the field of proteomics. Each spot in the image represents a protein accumulation an...
Alexandre Noma, Alvaro Pardo, Roberto Marcondes Ce...
115
Voted
SIGIR
2005
ACM
15 years 9 months ago
Bootstrapping dictionaries for cross-language information retrieval
The bottleneck for dictionary-based cross-language information retrieval is the lack of comprehensive dictionaries, in particular for many different languages. We here introduce a...
Kornél G. Markó, Stefan Schulz, Olen...
121
Voted
WOWMOM
2005
ACM
127views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Game Theoretic Power Aware Wireless Data Access
Abstract—This paper examines the following wireless data access scenario: a number of clients are interested in a set of data items kept at the server. A client sends a query req...
Mark Kai Ho Yeung, Yu-Kwong Kwok
138
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Dynamics of TCP/RED and a Scalable Control
— We demonstrate that the dynamic behavior of queue and average window is determined predominantly by the stability of TCP/RED, not by AIMD probing nor noise traffic. We develop...
Steven H. Low, Fernando Paganini, Jiantao Wang, Sa...