Sciweavers

4466 search results - page 721 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
IEEEINTERACT
2003
IEEE
15 years 8 months ago
Compiler-Directed Resource Management for Active Code Regions
Recent studies on program execution behavior reveal that a large amount of execution time is spent in small frequently executed regions of code. Whereas adaptive cache management ...
Ravikrishnan Sree, Alex Settle, Ian Bratt, Daniel ...
EUROPAR
2001
Springer
15 years 7 months ago
Optimal Polling for Latency-Throughput Tradeoffs in Queue-Based Network Interfaces for Clusters
We consider a networking subsystem for message–passing clusters that uses two unidirectional queues for data transfers between the network interface card (NIC) and the lower prot...
Dmitry Ponomarev, Kanad Ghose, Eugeny Saksonov
WSC
2007
15 years 5 months ago
Non-Gaussian asset allocation in the federal thrift savings plan
Historical data suggest that returns of stocks and indices are not distributed independent and identically Normal, as is commonly assumed. Instead, returns of financial assets are...
Scott T. Nestler
IASTEDSEA
2004
15 years 4 months ago
Java bytecode verification with dynamic structures
Java applets run on a Virtual Machine that checks code's integrity and correctness before execution using a module called Bytecode Verifier. Java Card technology allows Java ...
Cinzia Bernardeschi, Luca Martini, Paolo Masci
CSDA
2006
95views more  CSDA 2006»
15 years 3 months ago
Identifying influential multinomial observations by perturbation
The assessment of the influence of individual observations on the outcome of the analysis by perturbation has received a lot of attention for situations in which the observations ...
S. O. Nyangoma, W.-K. Fung, R. C. Jansen