Sciweavers

2402 search results - page 319 / 481
» Performance Analysis of a Distributed Question Answering Sys...
Sort
View
119
Voted
CONCUR
2008
Springer
15 years 5 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
138
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Opportunistic Access with Random Subchannel Backoff (OARSB) for OFDMA Uplink
Abstract— A distributed medium access control (MAC) algorithm for uplink OFDMA networks under the IEEE 802.16 framework is proposed and analyzed in this work. We present a simple...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
125
Voted
LREC
2010
176views Education» more  LREC 2010»
15 years 5 months ago
There's no Data like More Data? Revisiting the Impact of Data Size on a Classification Task
In the paper we investigate the impact of data size on a Word Sense Disambiguation task (WSD). We question the assumption that the knowledge acquisition bottleneck, which is known...
Ines Rehbein, Josef Ruppenhofer
137
Voted
GRID
2008
Springer
15 years 3 months ago
Scheduling for Responsive Grids
Grids are facing the challenge of seamless integration of the grid power into everyday use. One critical component for this integration is responsiveness, the capacity to support o...
Cécile Germain-Renaud, Charles Loomis, Jaku...
152
Voted
OPODIS
2003
15 years 5 months ago
Transient Model for Jackson Networks and Its Approximation
Jackson networks have been very successful in so many areas in modeling parallel and distributed systems. However, the ability of Jackson networks to predict performance with syste...
Ahmed M. Mohamed, Lester Lipsky, Reda A. Ammar