Sciweavers

10909 search results - page 2048 / 2182
» Evaluating Backup Algorithms
Sort
View
DATE
2008
IEEE
145views Hardware» more  DATE 2008»
15 years 10 months ago
Minimizing Virtual Channel Buffer for Routers in On-chip Communication Architectures
We present a novel methodology for design space exploration using a two-steps scheme to optimize the number of virtual channel buffers (buffers take the premier share of the route...
Mohammad Abdullah Al Faruque, Jörg Henkel
HPDC
2008
IEEE
15 years 10 months ago
Improving peer connectivity in wide-area overlays of virtual workstations
Self-configuring virtual networks rely on structured P2P routing to provide seamless connectivity among nodes through overlay routing of virtual IP packets, support decentralized...
Arijit Ganguly, P. Oscar Boykin, David Wolinsky, R...
ICASSP
2008
IEEE
15 years 10 months ago
Adaptation of compressed HMM parameters for resource-constrained speech recognition
Recently, we successfully developed and reported a new unsupervised online adaptation technique, which jointly compensates for additive and convolutive distortions with vector Tay...
Jinyu Li, Li Deng, Dong Yu, Jian Wu, Yifan Gong, A...
ICDCS
2008
IEEE
15 years 10 months ago
Correlation-Aware Object Placement for Multi-Object Operations
A multi-object operation incurs communication or synchronization overhead when the requested objects are distributed over different nodes. The object pair correlations (the probab...
Ming Zhong, Kai Shen, Joel I. Seiferas
ICDM
2008
IEEE
141views Data Mining» more  ICDM 2008»
15 years 10 months ago
Scalable Tensor Decompositions for Multi-aspect Data Mining
Modern applications such as Internet traffic, telecommunication records, and large-scale social networks generate massive amounts of data with multiple aspects and high dimensiona...
Tamara G. Kolda, Jimeng Sun
« Prev « First page 2048 / 2182 Last » Next »