Sciweavers

1056 search results - page 130 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
128
Voted
ITCC
2000
IEEE
15 years 6 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh
MM
2000
ACM
87views Multimedia» more  MM 2000»
15 years 6 months ago
Giving meanings to WWW images
Images are increasingly being embedded in HTML documents on the WWW. Such documents over the WWW essentially provides a rich source of image collection from which users can query....
Heng Tao Shen, Beng Chin Ooi, Kian-Lee Tan
SAC
2000
ACM
15 years 6 months ago
A Mobile Agent Infrastructure for the Mobility Support
The mobility of terminals and users is a crucial issue in the open global system represented by the Internet. Supporting terminal and user mobility requires a middleware infrastru...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
DAC
1999
ACM
15 years 6 months ago
Common-Case Computation: A High-Level Technique for Power and Performance Optimization
This paper presents a design methodology, called common-case computation (CCC), and new design automation algorithms for optimizing power consumption or performance. The proposed ...
Ganesh Lakshminarayana, Anand Raghunathan, Kamal S...
ICDCS
1999
IEEE
15 years 6 months ago
Active Correlation Tracking
We describe methods of identifying and exploiting sharing patterns in multi-threaded DSM applications. Active correlation tracking is used to determine the affinity, or amount of ...
Kritchalach Thitikamol, Peter J. Keleher