Sciweavers

1293 search results - page 186 / 259
» Data Dissemination Techniques for Distributed Simulation Env...
Sort
View
CSDA
2011
13 years 3 months ago
Inferences on Weibull parameters with conventional type-I censoring
In this article we consider the statistical inferences of the unknown parameters of a Weibull distribution when the data are Type-I censored. It is well known that the maximum lik...
Avijit Joarder, Hare Krishna, Debasis Kundu
ICDCS
2008
IEEE
14 years 2 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
EUROPAR
2005
Springer
14 years 1 months ago
MADIS: A Slim Middleware for Database Replication
Availability and performance can be improved using data replication as the basic technique, thus benefitting the services provided by a distributed system. However, replication im...
Luis Irún-Briz, Hendrik Decker, Rubé...
IPPS
2003
IEEE
14 years 1 months ago
Performance and Overhead in a Hybrid Reconfigurable Computer
In this paper, we overview general hardware architecture and a programming model of SRC-6ETM reconfigurable computers, and compare the performance of the SRC-6E machine vs. Intel...
Osman Devrim Fidanci, Daniel S. Poznanovic, Kris G...
ICDM
2008
IEEE
184views Data Mining» more  ICDM 2008»
14 years 2 months ago
Bayesian Co-clustering
In recent years, co-clustering has emerged as a powerful data mining tool that can analyze dyadic data connecting two entities. However, almost all existing co-clustering techniqu...
Hanhuai Shan, Arindam Banerjee