Sciweavers

1616 search results - page 282 / 324
» Techniques for Achieving High Performance Web Servers
Sort
View
ISLPED
2009
ACM
132views Hardware» more  ISLPED 2009»
15 years 8 months ago
Enabling ultra low voltage system operation by tolerating on-chip cache failures
Extreme technology integration in the sub-micron regime comes with a rapid rise in heat dissipation and power density for modern processors. Dynamic voltage scaling is a widely us...
Amin Ansari, Shuguang Feng, Shantanu Gupta, Scott ...
ADMA
2008
Springer
122views Data Mining» more  ADMA 2008»
15 years 8 months ago
Open Domain Recommendation: Social Networks and Collaborative Filtering
Commercial enterprises employ data mining techniques to recommend products to their customers. Most of the prior research is usually focused on a specific domain such as movies or...
Sarah K. Tyler, Yi Zhang
DSN
2007
IEEE
15 years 8 months ago
Improving Recoverability in Multi-tier Storage Systems
Enterprise storage systems typically contain multiple storage tiers, each having its own performance, reliability, and recoverability. The primary motivation for this multi-tier o...
Marcos Kawazoe Aguilera, Kimberly Keeton, Arif Mer...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 8 months ago
A Spreading Code MAC Protocol for Multi-Hop Wireless Ad Hoc Networks
— We propose a spreading code medium access control (MAC) protocol with each node equipped with single transceiver for wireless ad hoc networks, based on the code division multip...
Hang Su, Xi Zhang
CCS
2007
ACM
15 years 8 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia