Sciweavers

253 search results - page 27 / 51
» Increasing the availability provided by RADIC with low overh...
Sort
View
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
15 years 11 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
PLDI
2010
ACM
15 years 8 months ago
Pacer: Proportional Detection of Data Races
Data races indicate serious concurrency bugs such as order, atomicity, and sequential consistency violations. Races are difficult to find and fix, often manifesting only in deploy...
Michael D. Bond, Katherine E. Coons, Kathryn S. Mc...
ISCA
2008
IEEE
205views Hardware» more  ISCA 2008»
15 years 5 months ago
VEAL: Virtualized Execution Accelerator for Loops
Performance improvement solely through transistor scaling is becoming more and more difficult, thus it is increasingly common to see domain specific accelerators used in conjunc...
Nathan Clark, Amir Hormati, Scott A. Mahlke
EJWCN
2010
138views more  EJWCN 2010»
14 years 5 months ago
An Interference-Aware Admission Control Design for Wireless Mesh Networks
With the increasing popularity of wireless mesh networks (WMNs), the demand for multimedia services encompassing VoIP, multimedia streaming and interactive gaming is increasing rap...
Devu Manikantan Shila, Tricha Anjali
PERCOM
2006
ACM
15 years 10 months ago
Performance Analysis of Stealth DHT with Mobile Nodes
The advances in wireless networking and the consequent emergence of new applications that wireless networks increasingly support inevitably leads to low capability mobile nodes co...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, La...