Sciweavers

8132 search results - page 1587 / 1627
» Dependability, Abstraction, and Programming
Sort
View
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 4 months ago
Utility-Based User Grouping and Bandwidth Allocation for Wireless Multicast Systems
Abstract—With the proliferation of wireless multimedia applications, multicast/broadcast has been recognized as an efficient technique to transmit a large volume of data to mult...
Juan Liu, Wei Chen, Zhigang Cao, Ying Jun Zhang, S...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 4 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
ICPP
2009
IEEE
15 years 4 months ago
LeWI: A Runtime Balancing Algorithm for Nested Parallelism
Abstract—We present LeWI: a novel load balancing algorithm, that can balance applications with very different patterns of imbalance. Our algorithm can balance fine grain imbalan...
Marta Garcia, Julita Corbalán, Jesús...
INFOCOM
2009
IEEE
15 years 4 months ago
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks
Abstract—Recently, cellular phone networks have begun allowing third-party applications to run over certain open-API phone operating systems such as Windows Mobile, Iphone and Go...
Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya ...
ACG
2009
Springer
15 years 4 months ago
Adding Expert Knowledge and Exploration in Monte-Carlo Tree Search
Abstract. We present a new exploration term, more efficient than classical UCT-like exploration terms. It combines efficiently expert rules, patterns extracted from datasets, All-M...
Guillaume Chaslot, Christophe Fiter, Jean-Baptiste...
« Prev « First page 1587 / 1627 Last » Next »