Sciweavers

12257 search results - page 2239 / 2452
» Analysis of Algorithms
Sort
View
116
Voted
EUROSYS
2011
ACM
14 years 7 months ago
Scarlett: coping with skewed content popularity in mapreduce clusters
To improve data availability and resilience MapReduce frameworks use file systems that replicate data uniformly. However, analysis of job logs from a large production cluster show...
Ganesh Ananthanarayanan, Sameer Agarwal, Srikanth ...
213
Voted
FASE
2011
Springer
14 years 7 months ago
Automated Learning of Probabilistic Assumptions for Compositional Reasoning
Probabilistic verification techniques have been applied to the formal modelling and analysis of a wide range of systems, from communication protocols such as Bluetooth, to nanosca...
Lu Feng, Marta Z. Kwiatkowska, David Parker
123
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Delay-bounded adaptive UFH-based anti-jamming wireless communication
—Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of uncoordinated freque...
Qian Wang, Ping Xu, Kui Ren, Xiang-yang Li
252
Voted
JCDL
2011
ACM
374views Education» more  JCDL 2011»
14 years 6 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
144
Voted
RTS
2011
176views more  RTS 2011»
14 years 6 months ago
Improved priority assignment for global fixed priority pre-emptive scheduling in multiprocessor real-time systems
This paper is an extended version of a paper that appeared in the proceedings of the IEEE Real-Time Systems Symposium 2009. This paper has been updated with respect to advances ma...
Robert I. Davis, Alan Burns
« Prev « First page 2239 / 2452 Last » Next »