Sciweavers

24529 search results - page 4898 / 4906
» Computing on Authenticated Data
Sort
View
INFOCOM
2011
IEEE
13 years 1 months ago
Describing and forecasting video access patterns
Abstract—Computer systems are increasingly driven by workloads that reflect large-scale social behavior, such as rapid changes in the popularity of media items like videos. Capa...
Gonca Gürsun, Mark Crovella, Ibrahim Matta
ADHOC
2011
13 years 1 months ago
RadiaLE: A framework for designing and assessing link quality estimators in wireless sensor networks
—Stringent cost and energy constraints impose the use of low-cost and low-power radio transceivers in large-scale wireless sensor networks (WSNs). This fact, together with the ha...
Nouha Baccour, Anis Koubaa, Maissa Ben Jamâa...
AIPS
2011
13 years 1 months ago
Planning and Acting in Incomplete Domains
Engineering complete planning domain descriptions is often very costly because of human error or lack of domain knowledge. Learning complete domain descriptions is also very chall...
Christopher Weber, Daniel Bryce
CORR
2011
Springer
186views Education» more  CORR 2011»
13 years 1 months ago
Blind Compressed Sensing Over a Structured Union of Subspaces
—This paper addresses the problem of simultaneous signal recovery and dictionary learning based on compressive measurements. Multiple signals are analyzed jointly, with multiple ...
Jorge Silva, Minhua Chen, Yonina C. Eldar, Guiller...
FAST
2011
13 years 1 months ago
Emulating Goliath Storage Systems with David
Benchmarking file and storage systems on large filesystem images is important, but difficult and often infeasible. Typically, running benchmarks on such large disk setups is a ...
Nitin Agrawal, Leo Arulraj, Andrea C. Arpaci-Dusse...
« Prev « First page 4898 / 4906 Last » Next »