Sciweavers

1566 search results - page 123 / 314
» Contification Using Dominators
Sort
View
ICDE
2007
IEEE
176views Database» more  ICDE 2007»
15 years 4 months ago
Finding Important People in Large News Video Databases Using Multimodal and Clustering Analysis
The wide availability of large scale databases requires more efficient and scalable tools for data understanding and knowledge discovery. In this paper, we present a method to ...
Duy-Dinh Le, Shin'ichi Satoh, Michael E. Houle, Da...
LATIN
2004
Springer
15 years 3 months ago
Bidimensional Parameters and Local Treewidth
For several graph-theoretic parameters such as vertex cover and dominating set, it is known that if their sizes are bounded by k then the treewidth of the graph is bounded by some ...
Erik D. Demaine, Fedor V. Fomin, Mohammad Taghi Ha...
CANPC
1998
Springer
15 years 2 months ago
The Remote Enqueue Operation on Networks of Workstations
Abstract. Modern networks of workstations connected by Gigabit networks have the ability to run high-performance computing applications at a reasonable performance, but at a signi ...
Evangelos P. Markatos, Manolis Katevenis, Penny Va...
PADS
1998
ACM
15 years 2 months ago
Optimizing Communication in Time-Warp Simulators
In message passing environments, the message send time is dominated by overheads that are relatively independent of the message size. Therefore, fine-grained applications (such a...
Malolan Chetlur, Nael B. Abu-Ghazaleh, Radharamana...
SIGCOMM
1994
ACM
15 years 2 months ago
Wide-Area Traffic: The Failure of Poisson Modeling
Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet interarrivals are not exponentially...
Vern Paxson, Sally Floyd