Sciweavers

1566 search results - page 183 / 314
» Contification Using Dominators
Sort
View
CODES
2006
IEEE
15 years 4 months ago
A buffer-sizing algorithm for networks on chip using TDMA and credit-based end-to-end flow control
When designing a System-on-Chip (SoC) using a Networkon-Chip (NoC), silicon area and power consumption are two key elements to optimize. A dominant part of the NoC area and power ...
Martijn Coenen, Srinivasan Murali, Andrei Radulesc...
INFOCOM
2006
IEEE
15 years 4 months ago
Minimum-Energy Broadcast Using Practical Directional Antennas in All-Wireless Networks
— Energy-efficient broadcast communication is an important problem in wireless ad hoc networks. Previously, minimum-energy broadcast that exploits the broadcast nature of radio ...
Sabyasachi Roy, Y. Charlie Hu, Dimitrios Peroulis,...
PPOPP
2010
ACM
15 years 7 months ago
Scaling LAPACK panel operations using parallel cache assignment
In LAPACK many matrix operations are cast as block algorithms which iteratively process a panel using an unblocked algorithm and then update a remainder matrix using the high perf...
Anthony M. Castaldo, R. Clint Whaley
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 4 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
RECSYS
2009
ACM
15 years 4 months ago
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models
Previous work on using external aggregate rating information showed that this information can be incorporated in several different types of recommender systems and improves their...
Akhmed Umyarov, Alexander Tuzhilin