Sciweavers

8655 search results - page 1228 / 1731
» Challenges for Trusted Computing
Sort
View
TKDE
2012
250views Formal Methods» more  TKDE 2012»
13 years 7 months ago
Dense Subgraph Extraction with Application to Community Detection
— This paper presents a method for identifying a set of dense subgraphs of a given sparse graph. Within the main applications of this “dense subgraph problem”, the dense subg...
Jie Chen 0007, Yousef Saad
EDBT
2012
ACM
254views Database» more  EDBT 2012»
13 years 7 months ago
Inside "Big Data management": ogres, onions, or parfaits?
In this paper we review the history of systems for managing “Big Data” as well as today’s activities and architectures from the (perhaps biased) perspective of three “data...
Vinayak R. Borkar, Michael J. Carey, Chen Li
HPDC
2012
IEEE
13 years 7 months ago
Work stealing and persistence-based load balancers for iterative overdecomposed applications
Applications often involve iterative execution of identical or slowly evolving calculations. Such applications require incremental rebalancing to improve load balance across itera...
Jonathan Lifflander, Sriram Krishnamoorthy, Laxmik...
HPDC
2012
IEEE
13 years 7 months ago
QBox: guaranteeing I/O performance on black box storage systems
Many storage systems are shared by multiple clients with different types of workloads and performance targets. To achieve performance targets without over-provisioning, a system ...
Dimitris Skourtis, Shinpei Kato, Scott Brandt
CHI
2009
ACM
16 years 5 months ago
Towards intelligent authoring tools for machinima creation
As user-created content increasingly becomes an ever more prominent element of modern game design, tools have been developed to aide in the creative process for several forms of d...
Brian O'Neill, Mark O. Riedl, Michael Nitsche
« Prev « First page 1228 / 1731 Last » Next »