Sciweavers

1906 search results - page 189 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
HPDC
1999
IEEE
15 years 8 months ago
Dodo: A User-level System for Exploiting Idle Memory in Workstation Clusters
In this paper, we present the design and implementation of Dodo, an e cient user-level system for harvesting idle memory in o -the-shelf clusters of workstations. Dodo enables dat...
Samir Koussih, Anurag Acharya, Sanjeev Setia
96
Voted
CORR
2010
Springer
70views Education» more  CORR 2010»
15 years 4 months ago
Web Conferencing Traffic - An Analysis using DimDim as Example
In this paper, we present an evaluation of the Ethernet traffic for host and attendees of the popular opensource web conferencing system DimDim. While traditional Internet-centric...
Patrick Seeling
INFOCOM
2009
IEEE
15 years 10 months ago
On the Impact of Heterogeneity and Back-End Scheduling in Load Balancing Designs
—Load balancing is a common approach for task assignment in distributed architectures. In this paper, we show that the degree of inefficiency in load balancing designs is highly...
Ho-Lin Chen, Jason R. Marden, Adam Wierman
INTERSPEECH
2010
14 years 10 months ago
Canonical state models for automatic speech recognition
Current speech recognition systems are often based on HMMs with state-clustered Gaussian Mixture Models (GMMs) to represent the context dependent output distributions. Though high...
Mark J. F. Gales, Kai Yu
DAC
2005
ACM
16 years 4 months ago
Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design
In many of embedded systems, particularly for those with high data computations, the delay of memory access is one of the major bottlenecks in the system's performance. It ha...
Jungeun Kim, Taewhan Kim