Sciweavers

7742 search results - page 1501 / 1549
» The Robustness of Level Sets
Sort
View
110
Voted
EUROSYS
2007
ACM
15 years 2 months ago
Enabling scalability and performance in a large scale CMP environment
Hardware trends suggest that large-scale CMP architectures, with tens to hundreds of processing cores on a single piece of silicon, are iminent within the next decade. While exist...
Bratin Saha, Ali-Reza Adl-Tabatabai, Anwar M. Ghul...
97
Voted
DOCENG
2008
ACM
15 years 2 months ago
An exploratory mapping strategy for web-driven magazines
"There will always (I hope) be print books, but just as the advent of photography changed the role of painting or film changed the role of theater in our culture, electronic ...
Fabio Giannetti
79
Voted
IMC
2007
ACM
15 years 2 months ago
Understanding the limitations of transmit power control for indoor wlans
A wide range of transmit power control (TPC) algorithms have been proposed in recent literature to reduce interference and increase capacity in 802.11 wireless networks. However, ...
Vivek Shrivastava, Dheeraj Agrawal, Arunesh Mishra...
IMC
2007
ACM
15 years 2 months ago
Quality-of-service class specific traffic matrices in ip/mpls networks
In this paper we consider the problem of determining traffic matrices for end-to-end demands in an IP/MPLS network that supports multiple quality of service (QoS) classes. More pr...
Stefan Schnitter, Franz Hartleb, Martin Horneffer
105
Voted
BNCOD
2007
96views Database» more  BNCOD 2007»
15 years 1 months ago
Extracting Temporal Information from Short Messages
Abstract. Information Extraction, the process of eliciting data from natural language documents, usually relies on the ability to parse the document and then to detect the meaning ...
Richard Cooper, Sinclair Manson
« Prev « First page 1501 / 1549 Last » Next »