Sciweavers

529 search results - page 74 / 106
» Laws of Pattern Composition
Sort
View
IPPS
2005
IEEE
15 years 5 months ago
On the Scalability of Centralized Control
Scalability of clusters and MPPs is typically discussed in terms of limits on growth: something which grows at a rate of O(log p) (where p is the number of processors) is said to ...
Dror G. Feitelson
INFOCOM
2003
IEEE
15 years 5 months ago
Asymptotic Insensitivity of Least-Recently-Used Caching to Statistical Dependency
Abstract— We investigate a widely popular Least-RecentlyUsed (LRU) cache replacement algorithm with semi-Markov modulated requests. Semi-Markov processes provide the flexibility...
Predrag R. Jelenkovic, Ana Radovanovic
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
15 years 4 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
KDD
1994
ACM
113views Data Mining» more  KDD 1994»
15 years 3 months ago
Exploration of Simulation Experiments by Discovery
: Weexemplify in this paper, howa discovery system is applied to the analysis of simulation experimentsin practical political planning, andshowwhatkind of newknowledgecan be discov...
Willi Klösgen
USAB
2008
15 years 1 months ago
Challenges in the Development and Evaluation of Immersive Digital Educational Games
In this paper, we describe a conceptual framework and address the related issues and solutions in the identification of three major challenges for the development and evaluation of...
Effie Lai-Chong Law, Michael D. Kickmeier-Rust, Di...