Sciweavers

5275 search results - page 919 / 1055
» Computing by observing
Sort
View
148
Voted
CF
2009
ACM
15 years 10 months ago
Mapping the LU decomposition on a many-core architecture: challenges and solutions
Recently, multi-core architectures with alternative memory subsystem designs have emerged. Instead of using hardwaremanaged cache hierarchies, they employ software-managed embedde...
Ioannis E. Venetis, Guang R. Gao
148
Voted
GROUP
2009
ACM
15 years 10 months ago
Information handover in time-critical work
Information transfer under time pressure and stress often leads to information loss. This paper studies the characteristics and problems of information handover from the emergency...
Aleksandra Sarcevic, Randall S. Burd
143
Voted
IMC
2009
ACM
15 years 10 months ago
Live streaming performance of the Zattoo network
A number of commercial peer-to-peer systems for live streaming, such as PPLive, Joost, LiveStation, SOPCast, TVants, etc. have been introduced in recent years. The behavior of the...
Hyunseok Chang, Sugih Jamin, Wenjie Wang
126
Voted
SIGGRAPH
2009
ACM
15 years 10 months ago
RACBVHs: random-accessible compressed bounding volume hierarchies
We present a novel bounding volume hierarchy (BVH) compression and decompression method transparently supporting random access on the compressed BVHs. To support random access on ...
Tae-Joon Kim, Bochang Moon, Duksu Kim, Sung-Eui Yo...
116
Voted
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 10 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...