Sciweavers

35416 search results - page 7075 / 7084
» Evaluation
Sort
View
STOC
2010
ACM
200views Algorithms» more  STOC 2010»
15 years 9 months ago
Hardness Amplification in Proof Complexity
We present a generic method for converting any family of unsatisfiable CNF formulas that require large resolution rank into CNF formulas whose refutation requires large rank for p...
Paul Beame, Trinh Huynh and Toniann Pitassi
EUROSYS
2008
ACM
15 years 8 months ago
Towards cinematic internet video-on-demand
Video-on-demand (VoD) is increasingly popular with Internet users. It gives users greater choice and more control than live streaming or file downloading. Systems such as MSN Vid...
Bin Cheng, Lex Stein, Hai Jin, Zheng Zhang
EUROSYS
2007
ACM
15 years 8 months ago
Adaptive control of virtualized resources in utility computing environments
Data centers are often under-utilized due to over-provisioning as well as time-varying resource demands of typical enterprise applications. One approach to increase resource utili...
Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa...
SOSP
2007
ACM
15 years 8 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
BSN
2009
IEEE
149views Sensor Networks» more  BSN 2009»
15 years 6 months ago
Optimizing Interval Training Protocols Using Data Mining Decision Trees
— Interval training consists of interl intensity exercises with rest periods. This training well known exercise protocol which helps stre improve one’s cardiovascular fitness. ...
Myung-kyung Suh, Mahsan Rofouei, Ani Nahapetian, W...
« Prev « First page 7075 / 7084 Last » Next »