Sciweavers

492 search results - page 70 / 99
» Encrypted Shared Data Spaces
Sort
View
SC
2000
ACM
14 years 2 months ago
A Comparison of Three Programming Models for Adaptive Applications on the Origin2000
Adaptive applications have computational workloads and communication patterns which change unpredictably at runtime, requiring dynamic load balancing to achieve scalable performan...
Hongzhang Shan, Jaswinder Pal Singh, Leonid Oliker...
USENIX
2007
14 years 8 hour ago
Supporting Practical Content-Addressable Caching with CZIP Compression
Content-based naming (CBN) enables content sharing across similar files by breaking files into positionindependent chunks and naming these chunks using hashes of their contents....
KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S....
ALENEX
2010
117views Algorithms» more  ALENEX 2010»
13 years 11 months ago
Untangling the Braid: Finding Outliers in a Set of Streams
Monitoring the performance of large shared computing systems such as the cloud computing infrastructure raises many challenging algorithmic problems. One common problem is to trac...
Chiranjeeb Buragohain, Luca Foschini, Subhash Suri
ICASSP
2010
IEEE
13 years 10 months ago
Multilingual acoustic modeling for speech recognition based on subspace Gaussian Mixture Models
Although research has previously been done on multilingual speech recognition, it has been found to be very difficult to improve over separately trained systems. The usual approa...
Lukas Burget, Petr Schwarz, Mohit Agarwal, Pinar A...
COMCOM
1999
99views more  COMCOM 1999»
13 years 9 months ago
Fair and reliable hop-by-hop flow control
Asynchronous transfer mode (ATM) networks can support different services with different Quality of Service (QoS) requirements. Among all service types, Available Bit Rate (ABR) is...
Wei Kuang Lai, Duan Ruei Shiu, Mei Chian Liou, Jiu...