Sciweavers

1268 search results - page 241 / 254
» One Logic to Use Them All
Sort
View
ITIIS
2010
137views more  ITIIS 2010»
14 years 10 months ago
Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks
In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable cl...
Chow-Sing Lin
IPPS
2010
IEEE
14 years 9 months ago
Profitability-based power allocation for speculative multithreaded systems
With the shrinking of transistors continuing to follow Moore's Law and the non-scalability of conventional outof-order processors, multi-core systems are becoming the design ...
Polychronis Xekalakis, Nikolas Ioannou, Salman Kha...
SDM
2012
SIAM
234views Data Mining» more  SDM 2012»
13 years 1 months ago
Monitoring and Mining Insect Sounds in Visual Space
Monitoring animals by the sounds they produce is an important and challenging task, whether the application is outdoors in a natural habitat, or in the controlled environment of a...
Yuan Hao, Bilson J. L. Campana, Eamonn J. Keogh
WWW
2002
ACM
16 years 6 days ago
Learning to map between ontologies on the semantic web
Ontologies play a prominent role on the Semantic Web. They make possible the widespread publication of machine understandable data, opening myriad opportunities for automated info...
AnHai Doan, Jayant Madhavan, Pedro Domingos, Alon ...
SISW
2005
IEEE
15 years 5 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash