Sciweavers

2631 search results - page 395 / 527
» Less is More
Sort
View
142
Voted
ISCA
2006
IEEE
133views Hardware» more  ISCA 2006»
15 years 9 months ago
TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Qing Yang, Weijun Xiao, Jin Ren
122
Voted
ISESE
2006
IEEE
15 years 9 months ago
PBR vs. checklist: a replication in the n-fold inspection context
Inspection is considered a powerful method to check software documents for defects. Many published work shows that inspections in requirements specification phase are particularly...
Lulu He, Jeffrey C. Carver
CF
2006
ACM
15 years 9 months ago
Kilo-instruction processors, runahead and prefetching
There is a continuous research effort devoted to overcome the memory wall problem. Prefetching is one of the most frequently used techniques. A prefetch mechanism anticipates the ...
Tanausú Ramírez, Alex Pajuelo, Olive...
116
Voted
AI
2005
Springer
15 years 9 months ago
Instance Cloning Local Naive Bayes
The instance-based k-nearest neighbor algorithm (KNN)[1] is an effective classification model. Its classification is simply based on a vote within the neighborhood, consisting o...
Liangxiao Jiang, Harry Zhang, Jiang Su
157
Voted
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 9 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...