Sciweavers

1845 search results - page 238 / 369
» Computing the Angularity Tolerance
Sort
View
IPPS
1999
IEEE
14 years 3 months ago
High-Performance Knowledge Extraction from Data on PC-Based Networks of Workstations
The automatic construction of classi ers programs able to correctly classify data collected from the real world is one of the major problems in pattern recognition and in a wide ar...
Cosimo Anglano, Attilio Giordana, Giuseppe Lo Bell...
SPAA
1997
ACM
14 years 3 months ago
Fine-Grain Multithreading with the EM-X Multiprocessor
- Multithreading aims to tolerate latency by overlapping communication with computation. This report explicates the multithreading capabilities of the EM-X distributed-memory multi...
Andrew Sohn, Yuetsu Kodama, Jui Ku, Mitsuhisa Sato...
IPPS
2010
IEEE
13 years 9 months ago
Use of Peer-To-Peer technology in Internet access networks and its impacts
Abstract--Objectives of the dissertation are impacts of Peerto-Peer (P2P) traffic on Internet core networks as well as novel approaches for using P2P technology in Internet access ...
Peter Danielis, Dirk Timmermann
DAC
2000
ACM
15 years 4 days ago
Can recursive bisection alone produce routable placements?
This work focuses on congestion-driven placement of standard cells into rows in the fixed-die context. We summarize the stateof-the-art after two decades of research in recursive ...
Andrew E. Caldwell, Andrew B. Kahng, Igor L. Marko...
STOC
2009
ACM
181views Algorithms» more  STOC 2009»
14 years 11 months ago
The detectability lemma and quantum gap amplification
The quantum analog of a constraint satisfaction problem is a sum of local Hamiltonians - each (term of the) Hamiltonian specifies a local constraint whose violation contributes to...
Dorit Aharonov, Itai Arad, Zeph Landau, Umesh V. V...