Sciweavers

4491 search results - page 487 / 899
» Algorithm Engineering
Sort
View
AIRWEB
2008
Springer
15 years 7 months ago
Identifying web spam with user behavior analysis
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Rongwei Cen, Min Zhang, Shaoping Ma, Li...
ARCS
2008
Springer
15 years 7 months ago
An Optimized ZGEMM Implementation for the Cell BE
: The architecture of the IBM Cell BE processor represents a new approach for designing CPUs. The fast execution of legacy software has to stand back in order to achieve very high ...
Timo Schneider, Torsten Hoefler, Simon Wunderlich,...
COMPSAC
2005
IEEE
15 years 7 months ago
A Low-Latency Checkpointing Scheme for Mobile Computing Systems
Fault-tolerant mobile computing systems have different requirements and restrictions, not taken into account by conventional distributed systems. This paper presents a coordinate...
Guohui Li, LihChyun Shu
CISSE
2008
Springer
15 years 6 months ago
From Constraints to Resolution Rules Part I : conceptual framework
: Many real world problems appear naturally as constraints satisfaction problems (CSP), for which very efficient algorithms are known. Most of these involve the combination of two ...
Denis Berthier
COMPSAC
2008
IEEE
15 years 6 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma