Sciweavers

1357 search results - page 225 / 272
» Clustering Orders
Sort
View
SAC
2010
ACM
14 years 1 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
CCGRID
2003
IEEE
14 years 1 months ago
Building a Performance Model of Streaming Media Applications in Utility Data Center Environment
Abstract Utility Data Center (UDC) provides a exible, coste ective infrastructure to support the hosting of applications for Internet services. In order to enable the design of a \...
Ludmila Cherkasova, Loren Staley
IEEEPACT
2003
IEEE
14 years 1 months ago
Picking Statistically Valid and Early Simulation Points
Modern architecture research relies heavily on detailed pipeline simulation. Simulating the full execution of an industry standard benchmark can take weeks to months to complete. ...
Erez Perelman, Greg Hamerly, Brad Calder
PDP
2003
IEEE
14 years 1 months ago
Automatic Optimisation of Parallel Linear Algebra Routines in Systems with Variable Load
Abstract. In this work an architecture of an automatically tuned linear algebra library proposed in previous works is extended in order to adapt it to platforms where both the CPU ...
Javier Cuenca, Domingo Giménez, José...
SBACPAD
2003
IEEE
106views Hardware» more  SBACPAD 2003»
14 years 1 months ago
A Parallel Implementation of the LTSn Method for a Radiative Transfer Problem
— A radiative transfer solver that implements the LTSn method was optimized and parallelized using the MPI message passing communication library. Timing and profiling informatio...
Roberto P. Souto, Haroldo F. de Campos Velho, Step...