Sciweavers

24529 search results - page 4651 / 4906
» Computing on Authenticated Data
Sort
View
ICS
2005
Tsinghua U.
15 years 9 months ago
Towards automatic translation of OpenMP to MPI
We present compiler techniques for translating OpenMP shared-memory parallel applications into MPI messagepassing programs for execution on distributed memory systems. This transl...
Ayon Basumallik, Rudolf Eigenmann
IPTPS
2005
Springer
15 years 9 months ago
Dynamic Load Balancing in Distributed Hash Tables
In Peer-to-Peer networks based on consistent hashing and ring topology each server is responsible for an interval chosen (pseudo-)randomly on a circle. The topology of the network...
Marcin Bienkowski, Miroslaw Korzeniowski, Friedhel...
140
Voted
PKDD
2005
Springer
129views Data Mining» more  PKDD 2005»
15 years 9 months ago
Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
Abstract. The paradigm of pattern discovery based on constraints was introduced with the aim of providing to the user a tool to drive the discovery process towards potentially inte...
Stefano Bistarelli, Francesco Bonchi
GW
2005
Springer
113views Biometrics» more  GW 2005»
15 years 9 months ago
Some Experiments in the Gestural Control of Synthesized Sonic Textures
Abstract. In this paper, we introduce some exploratory ideas and applications involving the gestural control of sonic textures. Three examples of how the gestural control of synthe...
Daniel Arfib, Jean-Michel Couturier, Jehan-Julien ...
ICS
2005
Tsinghua U.
15 years 9 months ago
Continuous Replica Placement schemes in distributed systems
The Replica Placement Problem (RPP) aims at creating a set of duplicated data objects across the nodes of a distributed system in order to optimize certain criteria. Typically, RP...
Thanasis Loukopoulos, Petros Lampsas, Ishfaq Ahmad
« Prev « First page 4651 / 4906 Last » Next »