Sciweavers

1415 search results - page 226 / 283
» List making in the home
Sort
View
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
15 years 5 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli
CLOUD
2010
ACM
15 years 5 months ago
Differential virtual time (DVT): rethinking I/O service differentiation for virtual machines
This paper investigates what it entails to provide I/O service differentiation and performance isolation for virtual machines on individual multicore nodes in cloud platforms. Sh...
Mukil Kesavan, Ada Gavrilovska, Karsten Schwan
COMPGEOM
2010
ACM
15 years 5 months ago
On degrees in random triangulations of point sets
We study the expected number of interior vertices of degree i in a triangulation of a point set S, drawn uniformly at random from the set of all triangulations of S, and derive va...
Micha Sharir, Adam Sheffer, Emo Welzl
COMPGEOM
2010
ACM
15 years 5 months ago
A dynamic data structure for approximate range searching
In this paper, we introduce a simple, randomized dynamic data structure for storing multidimensional point sets, called a quadtreap. This data structure is a randomized, balanced ...
David M. Mount, Eunhui Park
HT
2010
ACM
15 years 5 months ago
Of categorizers and describers: an evaluation of quantitative measures for tagging motivation
While recent research has advanced our understanding about the structure and dynamics of social tagging systems, we know little about (i) the underlying motivations for tagging (w...
Christian Körner, Roman Kern, Hans-Peter Grah...