Sciweavers

1410 search results - page 193 / 282
» Performance Analysis for a Two-Ring Distributed MIMO-OFDM Sy...
Sort
View
CIVR
2007
Springer
166views Image Analysis» more  CIVR 2007»
15 years 10 months ago
A content-based image retrieval scheme allowing for robust automatic personalization
The retrieval performance of content-based image retrieval (CBIR) systems is often disappointingly low, mainly due to the subjectivity of human perception. Relevance feedback (RF)...
Sotirios Chatzis, Anastasios D. Doulamis, Theodora...
JAVA
2001
Springer
15 years 8 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...
KBSE
2005
IEEE
15 years 10 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
HPDC
2000
IEEE
15 years 8 months ago
Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness
While the MPP is still the most common architecture in supercomputer centers today, a simpler and cheaper machine configuration is growing increasingly common. This alternative s...
Bianca Schroeder, Mor Harchol-Balter
SIGMOD
2008
ACM
139views Database» more  SIGMOD 2008»
16 years 4 months ago
Paths to stardom: calibrating the potential of a peer-based data management system
As peer-to-peer (P2P) networks become more familiar to the database community, intense interest has built up in using their scalability and resilience properties to scale database...
Mihai Lupu, Beng Chin Ooi, Y. C. Tay