Sciweavers

2139 search results - page 325 / 428
» Distributed computing and computer security education
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 9 months ago
Turning Cluster Management into Data Management: A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 9 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
CORR
2007
Springer
75views Education» more  CORR 2007»
13 years 9 months ago
Wavelet Based Semi-blind Channel Estimation For Multiband OFDM
— This paper introduces an expectation-maximization (EM) algorithm within a wavelet domain Bayesian framework for semi-blind channel estimation of multiband OFDM based UWB commun...
Sajad Sadough, Mahieddine Ichir, Emmanuel Jaffrot,...
CORR
2004
Springer
118views Education» more  CORR 2004»
13 years 9 months ago
Understanding Search Trees via Statistical Physics
We study the random m-ary search tree model (where m stands for the number of branches of the search tree), an important problem for data storage in computer science, using a varie...
Satya N. Majumdar, David S. Dean, Paul L. Krapivsk...
CORR
2000
Springer
84views Education» more  CORR 2000»
13 years 9 months ago
Robust Classification for Imprecise Environments
In real-world environments it usually is difficult to specify target operating conditions precisely, for example, target misclassification costs. This uncertainty makes building ro...
Foster J. Provost, Tom Fawcett