Sciweavers

4072 search results - page 546 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
188
Voted
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 6 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
140
Voted
FAST
2010
15 years 6 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
121
Voted
JACM
2000
86views more  JACM 2000»
15 years 3 months ago
Periodification scheme: constructing sorting networks with constant period
We consider comparator networks M that are used repeatedly: while the output produced by M is not sorted, it is fed again into M. Sorting algorithms working in this way are called ...
Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oes...
100
Voted
CORR
2000
Springer
81views Education» more  CORR 2000»
15 years 3 months ago
Safe cooperative robot dynamics on graphs
This paper initiates the use of vector fields to design, optimize, and implement reactive schedules for safe cooperative robot patterns on planar graphs. We consider Automated Gui...
Robert Ghrist, Daniel E. Koditschek
134
Voted
PERCOM
2009
ACM
15 years 10 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...