Sciweavers

3303 search results - page 537 / 661
» Multidimensional Access Methods
Sort
View
113
Voted
CF
2010
ACM
15 years 4 months ago
Global management of cache hierarchies
Cache memories currently treat all blocks as if they were equally important, but this assumption of equally importance is not always valid. For instance, not all blocks deserve to...
Mohamed Zahran, Sally A. McKee
109
Voted
AAAI
2008
15 years 3 months ago
Efficient Haplotype Inference with Answer Set Programming
Identifying maternal and paternal inheritance is essential to be able to find the set of genes responsible for a particular disease. Although we have access to genotype data (gene...
Esra Erdem, Ferhan Türe
135
Voted
FAST
2010
15 years 3 months ago
Write Endurance in Flash Drives: Measurements and Analysis
We examine the write endurance of USB flash drives using a range of approaches: chip-level measurements, reverse engineering, timing analysis, whole-device endurance testing, and ...
Simona Boboila, Peter Desnoyers
113
Voted
MOBISYS
2007
ACM
15 years 3 months ago
A resource optimized physical movement monitoring scheme for environmental and on-body sensor networks
— Perhaps the most significant challenge in design of on-body sensors is the wearability concern. This concern requires that the size of the nodes (sensors, processing units and ...
Antti Vehkaoja, Mari Zakrzewski, Jukka Lekkala, Sa...
115
Voted
FLAIRS
2008
15 years 3 months ago
Unsupervised Approach for Selecting Sentences in Query-based Summarization
When a user is served with a ranked list of relevant documents by the standard document search engines, his search task is usually not over. He has to go through the entire docume...
Yllias Chali, Shafiq R. Joty