Sciweavers

1727 search results - page 310 / 346
» An Approach to Performance Prediction for Parallel Applicati...
Sort
View
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
14 years 11 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
BMCBI
2010
94views more  BMCBI 2010»
14 years 9 months ago
Comparison study of microarray meta-analysis methods
Background: Meta-analysis methods exist for combining multiple microarray datasets. However, there are a wide range of issues associated with microarray meta-analysis and a limite...
Anna Campain, Yee Hwa Yang
ICS
2003
Tsinghua U.
15 years 2 months ago
miNI: reducing network interface memory requirements with dynamic handle lookup
Recent work in low-latency, high-bandwidth communication systems has resulted in building user–level Network InControllers (NICs) and communication abstractions that support dir...
Reza Azimi, Angelos Bilas
CODES
2011
IEEE
13 years 9 months ago
DistRM: distributed resource management for on-chip many-core systems
The trend towards many-core systems comes with various issues, among them their highly dynamic and non-predictable workloads. Hence, new paradigms for managing resources of many-c...
Sebastian Kobbe, Lars Bauer, Daniel Lohmann, Wolfg...
CLUSTER
2008
IEEE
15 years 4 months ago
Magnet: A novel scheduling policy for power reduction in cluster with virtual machines
—The concept of green computing has attracted much attention recently in cluster computing. However, previous local approaches focused on saving the energy cost of the components...
Liting Hu, Hai Jin, Xiaofei Liao, Xianjie Xiong, H...