Sciweavers

1155 search results - page 229 / 231
» Designing Benchmarks for P2P Systems
Sort
View
ICS
2010
Tsinghua U.
13 years 9 months ago
InterferenceRemoval: removing interference of disk access for MPI programs through data replication
As the number of I/O-intensive MPI programs becomes increasingly large, many efforts have been made to improve I/O performance, on both software and architecture sides. On the sof...
Xuechen Zhang, Song Jiang
MOBISYS
2010
ACM
13 years 9 months ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...
BMCBI
2010
179views more  BMCBI 2010»
13 years 7 months ago
A semi-supervised learning approach to predict synthetic genetic interactions by combining functional and topological properties
Background: Genetic interaction profiles are highly informative and helpful for understanding the functional linkages between genes, and therefore have been extensively exploited ...
Zhuhong You, Zheng Yin, Kyungsook Han, De-Shuang H...
CAD
2006
Springer
13 years 7 months ago
An efficient, error-bounded approximation algorithm for simulating quasi-statics of complex linkages
Design and analysis of articulated mechanical structures, commonly referred to as linkages, is an integral part of any CAD/CAM system. The most common approaches formulate the pro...
Stephane Redon, Ming C. Lin
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang