Sciweavers

8468 search results - page 1542 / 1694
» The Technology of Data Stashing
Sort
View
TC
2010
14 years 8 months ago
PERFECTORY: A Fault-Tolerant Directory Memory Architecture
—The number of CPUs in chip multiprocessors is growing at the Moore’s Law rate, due to continued technology advances. However, new technologies pose serious reliability challen...
Hyunjin Lee, Sangyeun Cho, Bruce R. Childers
CIKM
2010
Springer
14 years 8 months ago
Mining topic-level influence in heterogeneous networks
Influence is a complex and subtle force that governs the dynamics of social networks as well as the behaviors of involved users. Understanding influence can benefit various applic...
Lu Liu, Jie Tang, Jiawei Han, Meng Jiang, Shiqiang...
IMC
2010
ACM
14 years 8 months ago
The impact of YouTube recommendation system on video views
Hosting a collection of millions of videos, YouTube offers several features to help users discover the videos of their interest. For example, YouTube provides video search, relate...
Renjie Zhou, Samamon Khemmarat, Lixin Gao
IMC
2010
ACM
14 years 8 months ago
Performance comparison of 3G and metro-scale WiFi for vehicular network access
We perform a head-to-head comparison of the performance characteristics of a 3G network operated by a nation-wide provider and a metro-scale WiFi network operated by a commercial ...
Pralhad Deshpande, Xiaoxiao Hou, Samir R. Das
IMC
2010
ACM
14 years 8 months ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
« Prev « First page 1542 / 1694 Last » Next »