Sciweavers

8312 search results - page 1549 / 1663
» Performance data collection using a hybrid approach
Sort
View
SPAA
2010
ACM
15 years 6 months ago
Tree network coding for peer-to-peer networks
Partitioning is the dominant technique to transmit large files in peer-to-peer networks. A peer can redistribute each part immediately after its download. BitTorrent combines thi...
Arne Vater, Christian Schindelhauer, Christian Ort...
ICDE
2007
IEEE
193views Database» more  ICDE 2007»
16 years 2 months ago
Categorization and Optimization of Synchronization Dependencies in Business Processes
requirement. Furthermore, programming using sequence constructs normally produce nested structures and The current approachfor modeling synchronization in scattered code, especiall...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga
MICRO
2005
IEEE
130views Hardware» more  MICRO 2005»
15 years 7 months ago
Exploiting Vector Parallelism in Software Pipelined Loops
An emerging trend in processor design is the addition of short vector instructions to general-purpose and embedded ISAs. Frequently, these extensions are employed using traditiona...
Samuel Larsen, Rodric M. Rabbah, Saman P. Amarasin...
120
Voted
PPOPP
2012
ACM
13 years 9 months ago
Internally deterministic parallel algorithms can be fast
The virtues of deterministic parallelism have been argued for decades and many forms of deterministic parallelism have been described and analyzed. Here we are concerned with one ...
Guy E. Blelloch, Jeremy T. Fineman, Phillip B. Gib...
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
15 years 3 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
« Prev « First page 1549 / 1663 Last » Next »