Sciweavers

334 search results - page 56 / 67
» Experimental performance analysis of ada programs in cluster...
Sort
View
CSCW
2006
ACM
14 years 1 months ago
Response times in N-user replicated, centralized, and proximity-based hybrid collaboration architectures
We evaluate response times, in N-user collaborations, of the popular centralized (client-server) and replicated (peer-to-peer) architectures, and a hybrid architecture in which ea...
Sasa Junuzovic, Prasun Dewan
BMCBI
2006
166views more  BMCBI 2006»
13 years 7 months ago
bioNMF: a versatile tool for non-negative matrix factorization in biology
Background: In the Bioinformatics field, a great deal of interest has been given to Non-negative matrix factorization technique (NMF), due to its capability of providing new insig...
Alberto D. Pascual-Montano, Pedro Carmona-Saez, Mo...
CIVR
2007
Springer
180views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Probabilistic matching and resemblance evaluation of shapes in trademark images
We present a novel matching and similarity evaluation method for planar geometric shapes represented by sets of polygonal curves. Given two shapes, the matching algorithm randomly...
Helmut Alt, Ludmila Scharf, Sven Scholz
PLDI
2010
ACM
13 years 11 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
ISLPED
2006
ACM
74views Hardware» more  ISLPED 2006»
14 years 1 months ago
Power phase variation in a commercial server workload
Many techniques have been developed for adaptive power management of computing systems. These techniques rely on the presence of varying power phases to detect opportunities for a...
W. L. Bircher, L. K. John