Sciweavers

182 search results - page 35 / 37
» Do We Need Whatever More Than k-NN
Sort
View
ISPD
2003
ACM
121views Hardware» more  ISPD 2003»
14 years 3 months ago
Optimality, scalability and stability study of partitioning and placement algorithms
This paper studies the optimality, scalability and stability of stateof-the-art partitioning and placement algorithms. We present algorithms to construct two classes of benchmarks...
Jason Cong, Michail Romesis, Min Xie
SACMAT
2009
ACM
14 years 4 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
WIKIS
2009
ACM
14 years 4 months ago
Herding the cats: the influence of groups in coordinating peer production
Peer production systems rely on users to self-select appropriate tasks and “scratch their personal itch”. However, many such systems require significant maintenance work, whic...
Aniket Kittur, Bryan A. Pendleton, Robert E. Kraut
SCAM
2003
IEEE
14 years 3 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
FCCM
1998
IEEE
149views VLSI» more  FCCM 1998»
14 years 2 months ago
Configuration Compression for the Xilinx XC6200 FPGA
One of the major overheads in reconfigurable computing is the time it takes to reconfigure the devices in the system. This overhead limits the speedups possible in this exciting n...
Scott Hauck, Zhiyuan Li, Eric J. Schwabe