Sciweavers

5962 search results - page 1063 / 1193
» Working with Patterns and Code
Sort
View
117
Voted
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
15 years 10 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
158
Voted
CCECE
2009
IEEE
15 years 10 months ago
Inverse data transformation for change detection in wind turbine diagnostics
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...
CLUSTER
2009
IEEE
15 years 10 months ago
Reducing network contention with mixed workloads on modern multicore, clusters
Abstract—Multi-core systems are now extremely common in modern clusters. In the past commodity systems may have had up to two or four CPUs per compute node. In modern clusters, t...
Matthew J. Koop, Miao Luo, Dhabaleswar K. Panda
105
Voted
ICC
2009
IEEE
112views Communications» more  ICC 2009»
15 years 10 months ago
Push Popular Segments in P2P VoD System: Possibility and Design
—Video-on-Demand (VoD) services have attracted a lot of attentions in recent years. Measurement studies show that VCR (Video Cassette Recorder) operations, such as pause, rewind,...
Junfeng Xie, Edward Chan, Guihai Chen, Yang Guo
MICRO
2009
IEEE
144views Hardware» more  MICRO 2009»
15 years 10 months ago
Characterizing flash memory: anomalies, observations, and applications
Despite flash memory’s promise, it suffers from many idiosyncrasies such as limited durability, data integrity problems, and asymmetry in operation granularity. As architects, ...
Laura M. Grupp, Adrian M. Caulfield, Joel Coburn, ...
« Prev « First page 1063 / 1193 Last » Next »