Sciweavers

1017 search results - page 186 / 204
» A General Model for Authenticated Data Structures
Sort
View
HPDC
2010
IEEE
13 years 8 months ago
Comparison of resource platform selection approaches for scientific workflows
Cloud computing is increasingly considered as an additional computational resource platform for scientific workflows. The cloud offers opportunity to scale-out applications from d...
Yogesh L. Simmhan, Lavanya Ramakrishnan
SIAMCOMP
2011
13 years 2 months ago
The Chow Parameters Problem
Abstract. In the 2nd Annual FOCS (1961), Chao-Kong Chow proved that every Boolean threshold function is uniquely determined by its degree-0 and degree-1 Fourier coefficients. These...
Ryan O'Donnell, Rocco A. Servedio
POPL
2009
ACM
14 years 8 months ago
Feedback-directed barrier optimization in a strongly isolated STM
Speed improvements in today's processors have largely been delivered in the form of multiple cores, increasing the importance of ions that ease parallel programming. Software...
Nathan Grasso Bronson, Christos Kozyrakis, Kunle O...
WSDM
2010
ACM
1328views Data Mining» more  WSDM 2010»
14 years 4 months ago
TwitterRank: Finding Topic-sensitive Influential Twitterers
This paper focuses on the problem of identifying influential users of micro-blogging services. Twitter, one of the most notable micro-blogging services, employs a social-networkin...
Jianshu Weng, Ee-peng Lim, Jing Jiang, Qi He
ICEIS
2000
IEEE
13 years 12 months ago
A Holistic Information Systems Strategy for Organisational Management-HISSOM
Alignment of organisational strategy with Information Systems Strategy (ISS) has become critical as adoption of Information Systems (IS) over the last 50 years has escalated. IS c...
David Lanc, Lachlan M. MacKinnon