Sciweavers

256 search results - page 29 / 52
» Timing Verification by Successive Approximation
Sort
View
USENIX
2008
15 years 2 months ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 6 months ago
Throughput and Delay Analysis of Multihop IEEE 802.11 Networks with Capture
In this paper, we present an analytical model for the approximate calculation of the throughput and end-toend delay performance in single hop and multihop IEEE 802.11 networks unde...
Rima Khalaf, Izhak Rubin, Ju-Lan Hsu
EVOW
2009
Springer
14 years 9 months ago
The Dynamic Knapsack Problem Revisited: A New Benchmark Problem for Dynamic Combinatorial Optimisation
Abstract. In this paper we propose a new benchmark problem for dynamic combinatorial optimisation. Unlike most previous benchmarks, we focus primarily on the underlying dynamics of...
Philipp Rohlfshagen, Xin Yao
SSD
2007
Springer
150views Database» more  SSD 2007»
15 years 5 months ago
Online Amnesic Summarization of Streaming Locations
Abstract. Massive data streams of positional updates become increasingly difficult to manage under limited memory resources, especially in terms of providing near real-time respons...
Michalis Potamias, Kostas Patroumpas, Timos K. Sel...
ICDM
2006
IEEE
296views Data Mining» more  ICDM 2006»
15 years 5 months ago
Fast Random Walk with Restart and Its Applications
How closely related are two nodes in a graph? How to compute this score quickly, on huge, disk-resident, real graphs? Random walk with restart (RWR) provides a good relevance scor...
Hanghang Tong, Christos Faloutsos, Jia-Yu Pan