Sciweavers

295 search results - page 42 / 59
» Comparing Benchmarks Using Key Microarchitecture-Independent...
Sort
View
JSW
2007
106views more  JSW 2007»
13 years 7 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain
ARCS
2009
Springer
14 years 2 months ago
Evaluating Sampling Based Hotspot Detection
In sampling based hotspot detection, performance engineers sample the running program periodically and record the Instruction Pointer (IP) addresses at the sampling. Empirically, f...
Qiang Wu, Oskar Mencer
EMO
2009
Springer
181views Optimization» more  EMO 2009»
14 years 9 days ago
Multi-Objective Particle Swarm Optimizers: An Experimental Comparison
Particle Swarm Optimization (PSO) has received increased attention in the optimization research community since its first appearance. Regarding multi-objective optimization, a con...
Juan José Durillo, José Garcí...
EUROPAR
2007
Springer
13 years 11 months ago
Efficient Parallel Simulation of Large-Scale Neuronal Networks on Clusters of Multiprocessor Computers
To understand the principles of information processing in the brain, we depend on models with more than 105 neurons and 109 connections. These networks can be described as graphs o...
Hans E. Plesser, Jochen M. Eppler, Abigail Morriso...
USENIX
1996
13 years 9 months ago
A Comparison of OS Extension Technologies
The current trend in operating systems research is to allow applications to dynamically extend the kernel to improve application performance or extend functionality, but the most ...
Christopher Small, Margo I. Seltzer