Sciweavers

161 search results - page 10 / 33
» Using clustering strategies for creating authority files
Sort
View
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 2 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
CHI
1998
ACM
15 years 1 months ago
Information Archiving with Bookmarks: Personal Web Space Construction and Organization
Bookmarks are used as "personal Web information spaces" to help people remember and retrieve interesting Web pages. A study of personal Web information spaces surveyed 3...
David Abrams, Ronald Baecker, Mark H. Chignell
GRID
2006
Springer
14 years 9 months ago
Grid Deployment of Legacy Bioinformatics Applications with Transparent Data Access
Although grid computing offers great potential for executing large-scale bioinformatics applications, practical deployment is constrained by legacy interfaces. Most widely deployed...
Christophe Blanchet, Rémi Mollon, Douglas T...
52
Voted
ANNALS
2008
78views more  ANNALS 2008»
14 years 9 months ago
Netlib and NA-Net: Building a Scientific Computing Community
The Netlib software repository was created in 1984 to facilitate quick distribution of public domain software routines for use in scientific computation. The Numerical Analysis Ne...
Jack Dongarra, Gene H. Golub, Eric Grosse, Cleve B...
77
Voted
SC
2005
ACM
15 years 3 months ago
Performance-constrained Distributed DVS Scheduling for Scientific Applications on Power-aware Clusters
Left unchecked, the fundamental drive to increase peak performance using tens of thousands of power hungry components will lead to intolerable operating costs and failure rates. H...
Rong Ge, Xizhou Feng, Kirk W. Cameron