Sciweavers

832 search results - page 103 / 167
» Effect of Malicious Synchronization
Sort
View
INFOCOM
1995
IEEE
14 years 1 months ago
Measuring the Performance of Parallel Message-Based Process Architectures
Message-based process architectures are widely regarded as an effective method for structuring parallel protocol processing on shared memory multi-processor platforms. A message-b...
Douglas C. Schmidt, Tatsuya Suda
IAT
2009
IEEE
14 years 1 months ago
Managing Context-Dependent Workspace Awareness in an e-Collaboration Environment
—Users increasingly manage their home and work collaborations by exploiting online applications. However, they have to deal with a fragmented view of their workspaces, because ea...
Liliana Ardissono, Gianni Bosio, Anna Goy, Giovann...
ARTCOM
2009
IEEE
14 years 1 months ago
Maximizing the Efficiency of Parallel Apriori Algorithm
In this paper we attempt to maximize the efficiency of the parallel Apriori Algorithm. The paper analyzes the performance of the algorithm over different datasets and over n proce...
Ketan Shah, Sunita Mahajan
AAAI
2007
14 years 8 days ago
Parallel Structured Duplicate Detection
We describe a novel approach to parallelizing graph search using structured duplicate detection. Structured duplicate detection was originally developed as an approach to external...
Rong Zhou, Eric A. Hansen
WSC
2007
14 years 8 days ago
Simulation of scheduled ordering policies in distribution supply chains
In this paper we study a decentralized distribution supply chain with one supplier and many newsvendor-type retailers that face exogenous end-customer demands. Using total supply ...
Lucy G. Chen, Srinagesh Gavirneni