Sciweavers

2701 search results - page 501 / 541
» Evaluation Issues
Sort
View
SIGMETRICS
2010
ACM
212views Hardware» more  SIGMETRICS 2010»
15 years 4 months ago
A mean field model of work stealing in large-scale systems
In this paper, we consider a generic model of computational grids, seen as several clusters of homogeneous processors. In such systems, a key issue when designing efficient job al...
Nicolas Gast, Bruno Gaujal
CIKM
2001
Springer
15 years 4 months ago
PowerDB-IR - Information Retrieval on Top of a Database Cluster
Our current concern is a scalable infrastructure for information retrieval (IR) with up-to-date retrieval results in the presence of frequent, continuous updates. Timely processin...
Torsten Grabs, Klemens Böhm, Hans-Jörg S...
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
15 years 4 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly
MICCAI
2001
Springer
15 years 4 months ago
Valmet: A New Validation Tool for Assessing and Improving 3D Object Segmentation
Extracting 3D structures from volumetric images like MRI or CT is becoming a routine process for diagnosis based on quantitation, for radiotherapy planning, for surgical planning a...
Guido Gerig, Matthieu Jomier, Miranda Chakos
ASPDAC
2000
ACM
95views Hardware» more  ASPDAC 2000»
15 years 4 months ago
Fair watermarking techniques
Many intellectual property protection (IPP) techniques have been proposed. Their primary objectives are providing convincible proof of authorship with least degradation of the qua...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak