Sciweavers

4911 search results - page 615 / 983
» Tree dependence analysis
Sort
View
165
Voted
DSN
2008
IEEE
15 years 11 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
147
Voted
CGO
2005
IEEE
15 years 10 months ago
A General Compiler Framework for Speculative Optimizations Using Data Speculative Code Motion
Data speculative optimization refers to code transformations that allow load and store instructions to be moved across potentially dependent memory operations. Existing research w...
Xiaoru Dai, Antonia Zhai, Wei-Chung Hsu, Pen-Chung...
145
Voted
IPMI
2005
Springer
15 years 10 months ago
Fundamental Limits in 3D Landmark Localization
This work analyses the accuracy of estimating the location of 3D landmarks and characteristic image structures. Based on nonlinear estimation theory we study the minimal stochastic...
Karl Rohr
DFN
2003
15 years 5 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
ALMOB
2007
155views more  ALMOB 2007»
15 years 4 months ago
Finding coevolving amino acid residues using row and column weighting of mutual information and multi-dimensional amino acid rep
Background: Some amino acid residues functionally interact with each other. This interaction will result in an evolutionary co-variation between these residues – coevolution. Ou...
Rodrigo Gouveia-Oliveira, Anders Gorm Pedersen