Sciweavers

15781 search results - page 3047 / 3157
» Evaluating Information Extraction
Sort
View
159
Voted
ICAC
2009
IEEE
15 years 10 months ago
Resilient workload manager: taming bursty workload of scaling internet applications
In data centers hosting scaling Internet applications, operators face the tradeoff dilemma between resource efficiency and Quality of Service (QoS), and the root cause lies in wo...
Hui Zhang 0002, Guofei Jiang, Kenji Yoshihira, Hai...
ICC
2009
IEEE
139views Communications» more  ICC 2009»
15 years 10 months ago
Ergodic Secrecy Capacity Region of the Fading Broadcast Channel
— We consider the fading broadcast channel from a secrecy point of view. In this channel, each user views the other user as an eavesdropper, and wants to keep its information as ...
Ersen Ekrem, Sennur Ulukus
159
Voted
WCRE
2009
IEEE
15 years 10 months ago
A Study of the Time Dependence of Code Changes
—Much of modern software development consists of building on older changes. Older periods provide the structure (e.g., functions and data types) on which changes in future period...
Omar Alam, Bram Adams, Ahmed E. Hassan
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
15 years 10 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
132
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Multi-VPN Optimization for Scalable Routing via Relaying
—Enterprise networks are increasingly adopting Layer 3 Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) technology to connect geographically disparate locations...
MohammadHossein Bateni, Alexandre Gerber, Mohammad...
« Prev « First page 3047 / 3157 Last » Next »