Sciweavers

10909 search results - page 167 / 2182
» Evaluating Backup Algorithms
Sort
View
ASPDAC
2005
ACM
96views Hardware» more  ASPDAC 2005»
15 years 6 months ago
Comprehensive frequency dependent interconnect extraction and evaluation methodology
Abstract— Frequency dependent interconnect analysis is challenging since lumped equivalent circuit models extracted at different frequencies exhibit distinct time and frequency d...
Rong Jiang, Charlie Chung-Ping Chen
ELPUB
2008
ACM
15 years 5 months ago
Exploration and Evaluation of Citation Networks
This paper deals with the definitions, explanations and testing of the PageRank formula modified and adapted for bibliographic networks. Our modifications of PageRank take into ac...
Karel Jezek, Dalibor Fiala, Josef Steinberger
SDM
2008
SIAM
165views Data Mining» more  SDM 2008»
15 years 5 months ago
On the Dangers of Cross-Validation. An Experimental Evaluation
Cross validation allows models to be tested using the full training set by means of repeated resampling; thus, maximizing the total number of points used for testing and potential...
R. Bharat Rao, Glenn Fung
OSDI
1994
ACM
15 years 5 months ago
The Design and Evaluation of a Shared Object System for Distributed Memory Machines
This paper describes the design and evaluation of SAM, a shared object system for distributed memory machines. SAM is a portable run-time system that provides a global name space ...
Daniel J. Scales, Monica S. Lam
ESORICS
2008
Springer
15 years 5 months ago
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques
The evaluation of privacy-preserving techniques for LBS is often based on simulations of mostly random user movements that only partially capture real deployment scenarios. We clai...
Sergio Mascetti, Dario Freni, Claudio Bettini, Xia...