Sciweavers

186 search results - page 30 / 38
» Deriving Mixed Evaluation from Standard Evaluation for a Sim...
Sort
View
MSWIM
2004
ACM
14 years 24 days ago
Modeling wireless shadow networks
In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
Filip De Turck, Aurel A. Lazar
CORR
2011
Springer
158views Education» more  CORR 2011»
13 years 2 months ago
SqFreeEVAL: An (almost) optimal real-root isolation algorithm
Let f be a univariate polynomial with real coefficients, f ∈ R[X]. Subdivision algorithms based on algebraic techniques (e.g., Sturm or Descartes methods) are widely used for is...
Michael Burr, Felix Krahmer
ASPLOS
1992
ACM
13 years 11 months ago
Parity Declustering for Continuous Operation in Redundant Disk Arrays
We describe and evaluate a strategy for declustering the parity encoding in a redundant disk array. This declustered parity organization balances cost against data reliability and...
Mark Holland, Garth A. Gibson
TREC
2004
13 years 8 months ago
Concept Extraction and Synonymy Management for Biomedical Information Retrieval
This paper reports on work done for the Genomics Track at TREC 2004 by ConverSpeech LLC in conjunction with scientists at the Saccharomyces Genome Database (SGD), the model organi...
Colleen E. Crangle, Alex Zbyslaw, J. Michael Cherr...
WISE
2008
Springer
14 years 1 months ago
Requirements for Rich Internet Application Design Methodologies
Rich Internet Applications (RIAs) are quickly becoming the de facto standard for interactive web applications on the Internet, featuring rich interfaces that increase user usabilit...
Jevon M. Wright, Jens Dietrich