Sciweavers

3733 search results - page 656 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
STACS
1997
Springer
15 years 5 months ago
Methods and Applications of (MAX, +) Linear Algebra
Exotic semirings such as the “(max, +) semiring” (R ∪ {−∞}, max, +), or the “tropical semiring” (N ∪ {+∞}, min, +), have been invented and reinvented many times s...
Stephane Gaubert, Max Plus
APSCC
2008
IEEE
15 years 8 months ago
Analysis of Context-Aware Network Selection Schemes for Power Savings
Socio-technical developments in computing have resulted in the emergence of innovative mobile systems which exploit the information available on the Internet to optimize the perfo...
Pravin Pawar, Bert-Jan van Beijnum, Hermie Hermens...
ICNP
2006
IEEE
15 years 7 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
DSN
2005
IEEE
15 years 7 months ago
Lumping Matrix Diagram Representations of Markov Models
Continuous-time Markov chains (CTMCs) have been used successfully to model the dependability and performability of many systems. Matrix diagrams (MDs) are known to be a space-ef...
Salem Derisavi, Peter Kemper, William H. Sanders
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 7 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...