Sciweavers

2814 search results - page 491 / 563
» Competitive Analysis of Distributed Algorithms
Sort
View
ICDM
2008
IEEE
184views Data Mining» more  ICDM 2008»
14 years 3 months ago
Bayesian Co-clustering
In recent years, co-clustering has emerged as a powerful data mining tool that can analyze dyadic data connecting two entities. However, almost all existing co-clustering techniqu...
Hanhuai Shan, Arindam Banerjee
IEEEPACT
2008
IEEE
14 years 3 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
INFOCOM
2008
IEEE
14 years 3 months ago
Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks
—A new and simple MAC protocol is proposed. Each node transmits a burst with length sampled from a geometric distribution with parameter q followed by a carrier sense slot. A nod...
Greger Wikstrand, Thomas Nilsson, Mark S. Doughert...
ADHOCNOW
2008
Springer
14 years 3 months ago
Utility-Based Uplink Power Control in CDMA Wireless Networks with Real-Time Services
In this paper we address the problem of efficient power allocation in the uplink of CDMA wireless networks, emphasizing on the support of realtime services’ QoS prerequisites. Th...
Timotheos Kastrinogiannis, Eirini-Eleni Tsiropoulo...
ANSS
2007
IEEE
14 years 3 months ago
The JMT Simulator for Performance Evaluation of Non-Product-Form Queueing Networks
This paper describes JSIM: the simulation module of the Java Modelling Tools (JMT), an open-source fully-portable Java suite for capacity planning studies. The simulator has been ...
Marco Bertoli, Giuliano Casale, Giuseppe Serazzi