Sciweavers

6656 search results - page 1163 / 1332
» Change, Change, Change: Three Approaches
Sort
View
IMC
2010
ACM
13 years 7 months ago
Internet background radiation revisited
The monitoring of packets destined for reachable, yet unused, Internet addresses has proven to be a useful technique for measuring a variety of specific Internet phenomenon (e.g.,...
Eric Wustrow, Manish Karir, Michael Bailey, Farnam...
IPPS
2010
IEEE
13 years 7 months ago
Speculative execution on multi-GPU systems
Abstract--The lag of parallel programming models and languages behind the advance of heterogeneous many-core processors has left a gap between the computational capability of moder...
Gregory F. Diamos, Sudhakar Yalamanchili
WEBI
2010
Springer
13 years 7 months ago
Incorporating Seasonality into Search Suggestions Derived from Intranet Query Logs
While much research has been performed on query logs collected for major Web search engines, query log analysis to enhance search on smaller and more focused collections has attrac...
Stephen Dignum, Udo Kruschwitz, Maria Fasli, Yunhy...
HIPC
2009
Springer
13 years 7 months ago
Detailed analysis of I/O traces for large scale applications
- In this paper, we present a tool to extract I/O traces from very large applications running at full scale during their production runs. We analyze these traces to gain informatio...
Nithin Nakka, Alok N. Choudhary, Wei-keng Liao, Le...
ICRA
2009
IEEE
115views Robotics» more  ICRA 2009»
13 years 7 months ago
Trajectory generation of robotic fingers based on tri-axial tactile data for cap screwing task
In a previous paper, we developed a robotic finger equipped with optical three-axis tactile sensors, of which the sensing cell can separately detect normal and shearing forces. Wit...
Masahiro Ohka, Nobuyuki Morisawa, Hanafiah B. Yuss...
« Prev « First page 1163 / 1332 Last » Next »