Sciweavers

5977 search results - page 1109 / 1196
» Hierarchical Performance Modeling for Distributed System Arc...
Sort
View
CASES
2007
ACM
15 years 8 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
APPROX
2010
Springer
179views Algorithms» more  APPROX 2010»
15 years 5 months ago
Rumor Spreading on Random Regular Graphs and Expanders
Broadcasting algorithms are important building blocks of distributed systems. In this work we investigate the typical performance of the classical and well-studied push model. Assu...
Nikolaos Fountoulakis, Konstantinos Panagiotou
BMCBI
2010
154views more  BMCBI 2010»
15 years 4 months ago
An eScience-Bayes strategy for analyzing omics data
Background: The omics fields promise to revolutionize our understanding of biology and biomedicine. However, their potential is compromised by the challenge to analyze the huge da...
Martin Eklund, Ola Spjuth, Jarl E. S. Wikberg
GIS
2009
ACM
15 years 8 months ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson
147
Voted
GRC
2007
IEEE
15 years 4 months ago
Privacy Preserving Collaborative Filtering Using Data Obfuscation
Collaborative filtering (CF) systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. Th...
Rupa Parameswaran, Douglas M. Blough
« Prev « First page 1109 / 1196 Last » Next »