Sciweavers

3104 search results - page 555 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
154
Voted
CIKM
2009
Springer
15 years 10 months ago
Packing the most onto your cloud
Parallel dataflow programming frameworks such as Map-Reduce are increasingly being used for large scale data analysis on computing clouds. It is therefore becoming important to a...
Ashraf Aboulnaga, Ziyu Wang, Zi Ye Zhang
144
Voted
ITNG
2008
IEEE
15 years 10 months ago
Parallel FFT Algorithms on Network-on-Chips
This paper presents several parallel FFT algorithms with different degree of communication overhead for multiprocessors in Network-on-Chip(NoC) environment. Three different method...
Jun Ho Bahn, Jungsook Yang, Nader Bagherzadeh
121
Voted
VTC
2008
IEEE
115views Communications» more  VTC 2008»
15 years 10 months ago
Graph-Based Turbo DeCodulation with LDPC Codes
—Turbo DeCodulation is the combination of iterative demodulation and iterative source-channel decoding in a multiple Turbo process. The receiver structures of bit-interleaved cod...
Birgit Schotsch, Laurent Schmalen, Peter Vary, Tho...
143
Voted
CIKM
2007
Springer
15 years 10 months ago
Discovering interesting usage patterns in text collections: integrating text mining with visualization
This paper addresses the problem of making text mining results more comprehensible to humanities scholars, journalists, intelligence analysts, and other researchers, in order to s...
Anthony Don, Elena Zheleva, Machon Gregory, Sureyy...
120
Voted
ESORICS
2007
Springer
15 years 9 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...