Sciweavers

1636 search results - page 294 / 328
» Distributed application management using Plush
Sort
View
PR
2008
97views more  PR 2008»
14 years 11 months ago
A vision-based method for weeds identification through the Bayesian decision theory
One of the objectives of precision agriculture is to minimize the volume of herbicides that are applied to the fields through the use of site-specific weed management systems. Thi...
Alberto Tellaeche, Xavier P. Burgos-Artizzu, Gonza...
95
Voted
CASES
2010
ACM
14 years 9 months ago
Balancing memory and performance through selective flushing of software code caches
Dynamic binary translators (DBTs) are becoming increasingly important because of their power and flexibility. However, the high memory demands of DBTs present an obstacle for all ...
Apala Guha, Kim M. Hazelwood, Mary Lou Soffa
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
15 years 11 months ago
Tell me something I don't know: randomization strategies for iterative data mining
There is a wide variety of data mining methods available, and it is generally useful in exploratory data analysis to use many different methods for the same dataset. This, however...
Heikki Mannila, Kai Puolamäki, Markus Ojala, ...
ICS
2007
Tsinghua U.
15 years 5 months ago
Automatic nonblocking communication for partitioned global address space programs
Overlapping communication with computation is an important optimization on current cluster architectures; its importance is likely to increase as the doubling of processing power ...
Wei-Yu Chen, Dan Bonachea, Costin Iancu, Katherine...
ICDCS
2005
IEEE
15 years 4 months ago
Comparison of Approaches to Service Deployment
IT today is driven by the trend of increasing scale and complexity. Utility and Grid computing models, PlanetLab, and traditional data centers, are reaching the scale of thousands...
Vanish Talwar, Qinyi Wu, Calton Pu, Wenchang Yan, ...