Sciweavers

5675 search results - page 114 / 1135
» Exploiting Chaos for Computation
Sort
View
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 7 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
115
Voted
CGO
2007
IEEE
15 years 7 months ago
Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications
Run-time compilation systems are challenged with the task of translating a program’s instruction stream while maintaining low overhead. While software managed code caches are ut...
Vijay Janapa Reddi, Dan Connors, Robert Cohn, Mich...
109
Voted
DAGSTUHL
2007
15 years 2 months ago
Exploiting the ASM method within the Model-driven Engineering paradigm
act notation, so separating the abstract syntax and semantics of the language constructs from their different concrete notations. Although the foundation constituents of the MDE a...
Angelo Gargantini, Elvinia Riccobene, Patrizia Sca...
93
Voted
MOBICOM
2010
ACM
15 years 1 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
CN
2007
141views more  CN 2007»
15 years 25 days ago
Identifying lossy links in wired/wireless networks by exploiting sparse characteristics
In this paper, we consider the problem of estimating link loss rates based on end-to-end path loss rates in order to identify lossy links on the network. We first derive a maximu...
Hyuk Lim, Jennifer C. Hou