Sciweavers

2232 search results - page 357 / 447
» Estimating Contact Dynamics
Sort
View
CP
2009
Springer
14 years 10 months ago
Confidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing ...
Geoffrey Chu, Christian Schulte, Peter J. Stuckey
CHI
2006
ACM
14 years 9 months ago
Quantifying interpersonal influence in face-to-face conversations based on visual attention patterns
A novel measure for automatically quantifying the amount of interpersonal influence present in face-toface conversations is proposed based on the visualattention patterns of the p...
Kazuhiro Otsuka, Junji Yamato, Yoshinao Takemae, H...
HPCA
2002
IEEE
14 years 9 months ago
Bandwidth Adaptive Snooping
This paper advocates that cache coherence protocols use a bandwidth adaptive approach to adjust to varied system configurations (e.g., number of processors) and workload behaviors...
Milo M. K. Martin, Daniel J. Sorin, Mark D. Hill, ...
RECOMB
2007
Springer
14 years 9 months ago
Peptide Retention Time Prediction Yields Improved Tandem Mass Spectrum Identification for Diverse Chromatography Conditions
Most tandem mass spectrum identification algorithms use information only from the final spectrum, ignoring precursor information such as peptide retention time (RT). Efforts to exp...
Aaron A. Klammer, Xianhua Yi, Michael J. MacCoss, ...
VLDB
2007
ACM
169views Database» more  VLDB 2007»
14 years 9 months ago
Peer-to-Peer Similarity Search in Metric Spaces
This paper addresses the efficient processing of similarity queries in metric spaces, where data is horizontally distributed across a P2P network. The proposed approach does not r...
Christos Doulkeridis, Akrivi Vlachou, Yannis Kotid...