Sciweavers

2156 search results - page 306 / 432
» Effective performance measurement and analysis of multithrea...
Sort
View
IWC
2007
104views more  IWC 2007»
13 years 8 months ago
Lightweight techniques for structural evaluation of animated metaphors
Visual metaphors in the form of still or animated pictures have been used in user interfaces with the hope of enhancing learning and use of computer applications. This paper studi...
Jorma Sajaniemi, Tuija Stützle
TON
2008
76views more  TON 2008»
13 years 8 months ago
Minimizing file download time in stochastic peer-to-peer networks
The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% of the Internet's bandwidth usage. Measurement studies show th...
Yuh-Ming Chiu, Do Young Eun
IMC
2006
ACM
14 years 2 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
LCTRTS
2007
Springer
14 years 3 months ago
Combining source-to-source transformations and processor instruction set extensions for the automated design-space exploration o
Industry’s demand for flexible embedded solutions providing high performance and short time-to-market has led to the development of configurable and extensible processors. The...
Richard Vincent Bennett, Alastair Colin Murray, Bj...
PODS
2001
ACM
148views Database» more  PODS 2001»
14 years 9 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal