Sciweavers

1656 search results - page 321 / 332
» Building Dependable Distributed Applications Using AQUA
Sort
View
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 5 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan
CVPR
2006
IEEE
15 years 5 months ago
Fast Compact City Modeling for Navigation Pre-Visualization
Nowadays, GPS-based car navigation systems mainly use speech and aerial views of simplified road maps to guide drivers to their destination. However, drivers often experience dif...
Nico Cornelis, Kurt Cornelis, Luc J. Van Gool
KDD
2006
ACM
164views Data Mining» more  KDD 2006»
16 years 3 days ago
Assessing data mining results via swap randomization
The problem of assessing the significance of data mining results on high-dimensional 0?1 data sets has been studied extensively in the literature. For problems such as mining freq...
Aristides Gionis, Heikki Mannila, Panayiotis Tsapa...
CCGRID
2009
IEEE
15 years 6 months ago
Natively Supporting True One-Sided Communication in
As high-end computing systems continue to grow in scale, the performance that applications can achieve on such large scale systems depends heavily on their ability to avoid explic...
Gopalakrishnan Santhanaraman, Pavan Balaji, K. Gop...
SACMAT
2009
ACM
15 years 6 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger